Scientific Linux Security Update : lynx on SL3.x, SL4.x, SL5.x i386/x86_64

critical Nessus Plugin ID 60486


The remote Scientific Linux host is missing a security update.


An arbitrary command execution flaw was found in the Lynx 'lynxcgi:' URI handler. An attacker could create a web page redirecting to a malicious URL that could execute arbitrary code as the user running Lynx in the non-default 'Advanced' user mode. (CVE-2008-4690)

Note: In these updated lynx packages, Lynx will always prompt users before loading a 'lynxcgi:' URI. Additionally, the default lynx.cfg configuration file now marks all 'lynxcgi:' URIs as untrusted by default.

A flaw was found in a way Lynx handled '.mailcap' and '.mime.types' configuration files. Files in the browser's current working directory were opened before those in the user's home directory. A local attacker, able to convince a user to run Lynx in a directory under their control, could possibly execute arbitrary commands as the user running Lynx. (CVE-2006-7234)


Update the affected lynx package.

See Also

Plugin Details

Severity: Critical

ID: 60486

File Name: sl_20081027_lynx_on_SL3_x.nasl

Version: 1.5

Type: local

Agent: unix

Published: 8/1/2012

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information


Risk Factor: Medium

Score: 6.6


Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 10/27/2008

Reference Information

CVE: CVE-2006-7234, CVE-2008-4690