-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/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=mfmc
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1642-1
November 29, 2012
lynx-cur vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 10.04 LTS
Summary:
Two security issues were fixed in Lynx.
Software Description:
- lynx-cur: Text-mode WWW Browser with NLS support
Details:
Dan Rosenberg discovered a heap-based buffer overflow in Lynx. If a user
were tricked into opening a specially crafted page, a remote attacker could
cause a denial of service via application crash, or possibly execute
arbitrary code as the user invoking the program. This issue only affected
Ubuntu 10.04 LTS. (CVE-2010-2810)
It was discovered that Lynx did not properly verify that an HTTPS
certificate was signed by a trusted certificate authority. This could allow
an attacker to perform a "man in the middle" (MITM) attack which would make
the user believe their connection is secure, but is actually being
monitored. This update changes the behavior of Lynx such that self-signed
certificates no longer validate. Users requiring the previous behavior can
use the 'FORCE_SSL_PROMPT' option in lynx.cfg. (CVE-2012-5821)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.10:
lynx-cur 2.8.8dev.12-2ubuntu0.1
Ubuntu 12.04 LTS:
lynx-cur 2.8.8dev.9-2ubuntu0.12.04.1
Ubuntu 11.10:
lynx-cur 2.8.8dev.9-2ubuntu0.11.10.1
Ubuntu 10.04 LTS:
lynx-cur 2.8.8dev.2-1ubuntu0.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1642-1
CVE-2010-2810, CVE-2012-5821
Package Information:
https://launchpad.net/ubuntu/+source/lynx-cur/2.8.8dev.12-2ubuntu0.1
https://launchpad.net/ubuntu/+source/lynx-cur/2.8.8dev.9-2ubuntu0.12.04.1
https://launchpad.net/ubuntu/+source/lynx-cur/2.8.8dev.9-2ubuntu0.11.10.1
https://launchpad.net/ubuntu/+source/lynx-cur/2.8.8dev.2-1ubuntu0.1
No comments:
Post a Comment