Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2004-1617

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2004-1617
Last Modified 10 Sep 2008 03:31:22
Published 18 Oct 2004 12:00:00
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2004-1617

Summary

Lynx, lynx-ssl, and lynx-cur before 2.8.6dev.8 allow remote attackers to cause a denial of service (infinite loop) via a web page or HTML email that contains invalid HTML including (1) a TEXTAREA tag with a large COLS value and (2) a large tag name in an element that is not terminated, as demonstrated by mangleme. NOTE: a followup suggests that the relevant trigger for this issue is the large COLS value.

Vulnerable Systems

Application

  • University Of Kansas Lynx 2.7

  • University Of Kansas Lynx 2.8

  • University Of Kansas Lynx 2.8.1

  • University Of Kansas Lynx 2.8.2 Rel1

  • University Of Kansas Lynx 2.8.3

  • University Of Kansas Lynx 2.8.3 Dev22

  • University Of Kansas Lynx 2.8.3 Pre5

  • University Of Kansas Lynx 2.8.3 Rel1

  • University Of Kansas Lynx 2.8.4

  • University Of Kansas Lynx 2.8.4 Rel1

  • University Of Kansas Lynx 2.8.5

  • University Of Kansas Lynx 2.8.5 Dev2

  • University Of Kansas Lynx 2.8.5 Dev3

  • University Of Kansas Lynx 2.8.5 Dev4

  • University Of Kansas Lynx 2.8.5 Dev5

  • University Of Kansas Lynx 2.8.5 Dev8


References

XF - lynx-dos(17804)

BID - 11443

BUGTRAQ - 20060602 Re: [SECURITY] [DSA 1085-1] New lynx-cur packages fix several vulnerabilities

DEBIAN - DSA-1085

DEBIAN - DSA-1077

DEBIAN - DSA-1076

SECTRACK - 1011809

SECUNIA - 20383

BUGTRAQ - 20041018 Web browsers - a mini-farce

MISC - http://lcamtuf.coredump.cx/mangleme/gallery/


Last Updated: 27 May 2016 10:39:06