Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in Lynx
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in Lynx
ID: USN-1642-1
Distribution: Ubuntu
Plattformen: Ubuntu 10.04 LTS, Ubuntu 11.10, Ubuntu 12.04 LTS, Ubuntu 12.10
Datum: Fr, 30. November 2012, 12:20
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2810
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5821
Applikationen: Lynx

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============4642444972763818631==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="------------enig7819FFFA34188167DBE9DFFB"

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig7819FFFA34188167DBE9DFFB
Content-Type: text/plain; charset=ISO-8859-
Content-Transfer-Encoding: quoted-printable


==========================================================================
Ubuntu Security Notice USN-1642-1
November 29, 2012

lynx-cur vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 10.04 LTS

Summary:

Two security issues were fixed in Lynx.

Software Description:
- lynx-cur: Text-mode WWW Browser with NLS support

Details:

Dan Rosenberg discovered a heap-based buffer overflow in Lynx. If a user
were tricked into opening a specially crafted page, a remote attacker could
cause a denial of service via application crash, or possibly execute
arbitrary code as the user invoking the program. This issue only affected
Ubuntu 10.04 LTS. (CVE-2010-2810)

It was discovered that Lynx did not properly verify that an HTTPS
certificate was signed by a trusted certificate authority. This could allow
an attacker to perform a "man in the middle" (MITM) attack which would
make
the user believe their connection is secure, but is actually being
monitored. This update changes the behavior of Lynx such that self-signed
certificates no longer validate. Users requiring the previous behavior can
use the 'FORCE_SSL_PROMPT' option in lynx.cfg. (CVE-2012-5821)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.10:
lynx-cur 2.8.8dev.12-2ubuntu0.1

Ubuntu 12.04 LTS:
lynx-cur 2.8.8dev.9-2ubuntu0.12.04.1

Ubuntu 11.10:
lynx-cur 2.8.8dev.9-2ubuntu0.11.10.1

Ubuntu 10.04 LTS:
lynx-cur 2.8.8dev.2-1ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1642-1
CVE-2010-2810, CVE-2012-5821

Package Information:
https://launchpad.net/ubuntu/+source/lynx-cur/2.8.8dev.12-2ubuntu0.1
https://launchpad.net/ubuntu/+source/lynx-cur/2.8.8dev.9-2ubuntu0.12.04.1
https://launchpad.net/ubuntu/+source/lynx-cur/2.8.8dev.9-2ubuntu0.11.10.1
https://launchpad.net/ubuntu/+source/lynx-cur/2.8.8dev.2-1ubuntu0.1





--------------enig7819FFFA34188167DBE9DFFB
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=mfmc
-----END PGP SIGNATURE-----

--------------enig7819FFFA34188167DBE9DFFB--


--===============4642444972763818631==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============4642444972763818631==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung