Scientific Linux Security Update : elinks on SL4.x, SL5.x i386/x86_64

High Nessus Plugin ID 60673


The remote Scientific Linux host is missing a security update.


CVE-2007-2027 elinks tries to load .po files from a non-absolute path

CVE-2008-7224 elinks: entity_cache static array buffer overflow (off-by-one)

An off-by-one buffer overflow flaw was discovered in the way ELinks handled its internal cache of string representations for HTML special entities. A remote attacker could use this flaw to create a specially crafted HTML file that would cause ELinks to crash or, possibly, execute arbitrary code when rendered. (CVE-2008-7224)

It was discovered that ELinks tried to load translation files using relative paths. A local attacker able to trick a victim into running ELinks in a folder containing specially crafted translation files could use this flaw to confuse the victim via incorrect translations, or cause ELinks to crash and possibly execute arbitrary code via embedded formatting sequences in translated messages. (CVE-2007-2027)


Update the affected elinks package.

See Also

Plugin Details

Severity: High

ID: 60673

File Name: sl_20091001_elinks_on_SL4_x.nasl

Version: $Revision: 1.3 $

Type: local

Agent: unix

Published: 2012/08/01

Modified: 2016/12/14

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2009/10/01

Reference Information

CVE: CVE-2007-2027, CVE-2008-7224

CWE: 119, 134