GLSA-200706-03 : ELinks: User-assisted execution of arbitrary code
Medium Nessus Plugin ID 25453
SynopsisThe remote Gentoo host is missing one or more security-related patches.
DescriptionThe remote host is affected by the vulnerability described in GLSA-200706-03 (ELinks: User-assisted execution of arbitrary code)
Arnaud Giersch discovered that the 'add_filename_to_string()' function in file intl/gettext/loadmsgcat.c uses an untrusted relative path, allowing for a format string attack with a malicious .po file.
A local attacker could entice a user to run ELinks in a specially crafted directory environment containing a malicious '.po' file, possibly resulting in the execution of arbitrary code with the privileges of the user running ELinks.
There is no known workaround at this time.
SolutionAll ELinks users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=www-client/elinks-0.11.2-r1'