Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.55743
Categoría:FreeBSD Local Security Checks
Título:FreeBSD Ports: lynx
Resumen:The remote host is missing an update to the system; as announced in the referenced advisory.
Descripción:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following package is affected: lynx

CVE-2005-3120
Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and
earlier allows remote NNTP servers to execute arbitrary code via
certain article headers that cause Lynx to add extra escape (ESC)
characters.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2005-3120
BugTraq ID: 15117
http://www.securityfocus.com/bid/15117
Bugtraq: 20060602 Re: [SECURITY] [DSA 1085-1] New lynx-cur packages fix several vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/435689/30/4740/threaded
Debian Security Information: DSA-1085 (Google Search)
http://www.debian.org/security/2006/dsa-1085
Debian Security Information: DSA-874 (Google Search)
http://www.debian.org/security/2005/dsa-874
Debian Security Information: DSA-876 (Google Search)
http://www.debian.org/security/2005/dsa-876
http://www.securityfocus.com/archive/1/419763/100/0/threaded
http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038019.html
http://www.gentoo.org/security/en/glsa/glsa-200510-15.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2005:186
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170253
http://www.openpkg.org/security/OpenPKG-SA-2005.026-lynx.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9257
http://www.redhat.com/support/errata/RHSA-2005-803.html
SCO Security Bulletin: SCOSA-2005.47
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.47/SCOSA-2005.47.txt
SCO Security Bulletin: SCOSA-2006.7
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.7/SCOSA-2006.7.txt
http://securitytracker.com/id?1015065
http://secunia.com/advisories/17150
http://secunia.com/advisories/17216
http://secunia.com/advisories/17230
http://secunia.com/advisories/17231
http://secunia.com/advisories/17238
http://secunia.com/advisories/17248
http://secunia.com/advisories/17340
http://secunia.com/advisories/17360
http://secunia.com/advisories/17444
http://secunia.com/advisories/17445
http://secunia.com/advisories/17480
http://secunia.com/advisories/18376
http://secunia.com/advisories/18584
http://secunia.com/advisories/20383
http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.423056
SuSE Security Announcement: SUSE-SR:2005:025 (Google Search)
http://www.novell.com/linux/security/advisories/2005_25_sr.html
http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
https://usn.ubuntu.com/206-1/
CopyrightCopyright (C) 2008 E-Soft Inc.

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.