Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2003:023: lynx


Vulnerability Assessment Details

MDKSA-2003:023: lynx

Vulnerability Assessment Summary
Check for the version of the lynx package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2003:023 (lynx).


A vulnerability was discovered in lynx, a text-mode web browser. The HTTP
queries that lynx constructs are from arguments on the command line or the
$WWW_HOME environment variable, but lynx does not properly sanitize special
characters such as carriage returns or linefeeds. Extra headers can be inserted
into the request because of this, which can cause scripts that use lynx to fetch
data from the wrong site from servers that use virtual hosting.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2003:023
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

HP 288246-001 StorageWorks MSA SAN Switch 2/8 309503-001
$199.99
HP 288246-001 StorageWorks MSA SAN Switch 2/8 309503-001 pictureCisco WS-C2960-24TT-L Catalyst WSC296024TT Switch
$35.0
Cisco WS-C2960-24TT-L Catalyst WSC296024TT Switch  pictureBay Networks QENET 5450 Quad Port Ethernet Link Module New Open Box 5450
$28.5
Bay Networks QENET 5450 Quad Port Ethernet Link Module New Open Box 5450 pictureASUS GX-D1081 POWER SAVING 8-PORT EXTERNAL GIGABIT SWITCH
$19.99
ASUS GX-D1081 POWER SAVING 8-PORT EXTERNAL GIGABIT SWITCH picture


Discussions

No Discussions have been posted on this vulnerability.