drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in Lynx
Name: |
Zwei Probleme in Lynx |
|
ID: |
USN-1642-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 10.04 LTS, Ubuntu 11.10, Ubuntu 12.04 LTS, Ubuntu 12.10 |
|
Datum: |
Fr, 30. November 2012, 12:20 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2810
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5821 |
|
Applikationen: |
Lynx |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --===============4642444972763818631== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig7819FFFA34188167DBE9DFFB"
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig7819FFFA34188167DBE9DFFB Content-Type: text/plain; charset=ISO-8859- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-1642-1 November 29, 2012
lynx-cur vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10 - Ubuntu 12.04 LTS - Ubuntu 11.10 - Ubuntu 10.04 LTS
Summary:
Two security issues were fixed in Lynx.
Software Description: - lynx-cur: Text-mode WWW Browser with NLS support
Details:
Dan Rosenberg discovered a heap-based buffer overflow in Lynx. If a user were tricked into opening a specially crafted page, a remote attacker could cause a denial of service via application crash, or possibly execute arbitrary code as the user invoking the program. This issue only affected Ubuntu 10.04 LTS. (CVE-2010-2810)
It was discovered that Lynx did not properly verify that an HTTPS certificate was signed by a trusted certificate authority. This could allow an attacker to perform a "man in the middle" (MITM) attack which would make the user believe their connection is secure, but is actually being monitored. This update changes the behavior of Lynx such that self-signed certificates no longer validate. Users requiring the previous behavior can use the 'FORCE_SSL_PROMPT' option in lynx.cfg. (CVE-2012-5821)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.10: lynx-cur 2.8.8dev.12-2ubuntu0.1
Ubuntu 12.04 LTS: lynx-cur 2.8.8dev.9-2ubuntu0.12.04.1
Ubuntu 11.10: lynx-cur 2.8.8dev.9-2ubuntu0.11.10.1
Ubuntu 10.04 LTS: lynx-cur 2.8.8dev.2-1ubuntu0.1
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-1642-1 CVE-2010-2810, CVE-2012-5821
Package Information: https://launchpad.net/ubuntu/+source/lynx-cur/2.8.8dev.12-2ubuntu0.1 https://launchpad.net/ubuntu/+source/lynx-cur/2.8.8dev.9-2ubuntu0.12.04.1 https://launchpad.net/ubuntu/+source/lynx-cur/2.8.8dev.9-2ubuntu0.11.10.1 https://launchpad.net/ubuntu/+source/lynx-cur/2.8.8dev.2-1ubuntu0.1
--------------enig7819FFFA34188167DBE9DFFB Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with undefined - http://www.enigmail.net/
iQIcBAEBCgAGBQJQt9iNAAoJEFHb3FjMVZVzMgEQAJk9Iok0UtDAcp5Hxjper8aU ve8nDY7zL9a6FcMS6Hcy8585Fkg56iXy4BPZEiGzypXQDHK6puLqtwjrRyic8h8s ziunSNvYS1R6fDSvbspJs9oO91WEYvi8cJWcOGH105ZRczp5idI574fRQu5po70f Su0dpgK5z18kQEiou0f4CQPKiSOF0p6uwZKT5TkgEHwBYA5m3TVPKnXbekhIsLM4 bPrwiZHETjWXWtmeWkhZiP3jqKTmJRRrgW8AwuztW2XAiGs6MpNKHPoYtF94tZDl vbeOb0UFAzb6COQtpjbLNAHVpkGxN6rMXEfXBqL2a558gdJEMmAWEWRHfWS2RlhK zXYU1Pf+LIX9qyywfzSgJdPTMgs4OoevmXLibXEwXnfYvjisasbkUsiXWhKh+zI6 hUW8eoHoTtvjIT7iiX3Z1H658Gs7RsrSKT6soazEvjLujRdvWPzvVKJFV5nMj/he Lo76tlSyyCERNMWfj1/PFMMP5C+NnwZgISRrhzxhf61+LeQP9W2xnkAiucWaQfqh CtIFyM53GCJxBH0scKltk6oDynMqJ9iO2NmJ5zvPCn+1i1FSq3lY+e5ALDhC9Br2 GefIIETMpu6hgJ7ozFxueikroX/wYmTOvioqnxHHYhagZPpYZLqtKtjQyqFkbOzt 8tUbtFg8SOahno/TdmAA =mfmc -----END PGP SIGNATURE-----
--------------enig7819FFFA34188167DBE9DFFB--
--===============4642444972763818631== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============4642444972763818631==--
|
|
|
|