CVE-2004-1617

medium

Description

Lynx, lynx-ssl, and lynx-cur before 2.8.6dev.8 allow remote attackers to cause a denial of service (infinite loop) via a web page or HTML email that contains invalid HTML including (1) a TEXTAREA tag with a large COLS value and (2) a large tag name in an element that is not terminated, as demonstrated by mangleme. NOTE: a followup suggests that the relevant trigger for this issue is the large COLS value.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/17804

http://www.securityfocus.com/archive/1/435689/30/4740/threaded

http://www.debian.org/security/2006/dsa-1085

http://www.debian.org/security/2006/dsa-1077

http://www.debian.org/security/2006/dsa-1076

http://securitytracker.com/id?1011809

http://secunia.com/advisories/20383

http://marc.info/?l=bugtraq&m=109811406620511&w=2

http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027709.html

http://lcamtuf.coredump.cx/mangleme/gallery/

Details

Source: Mitre, NVD

Published: 2004-10-18

Updated: 2018-10-19

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Severity: Medium

CVSS v3

Base Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Severity: Medium