Lynx Internal URL Verification Code Execution

Medium Nessus Network Monitor Plugin ID 1739

Synopsis

The remote host is using Lynx as a web browser.

Description

The remote host is using Lynx as a web browser. The version used is vulnerable to a bug which may allow a rogue web site to be considered as a local page. An attacker may eventually use this flaw to execute arbitrary code on this host, with the privileges of the user running lynx.

Solution

No solution is known at this time.

Plugin Details

Severity: Medium

ID: 1739

File Name: 1739.prm

Family: Web Clients

Published: 2004/08/20

Modified: 2016/01/21

Dependencies: 1735, 8314

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSSv3

Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS3#E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:lynx:lynx

Reference Information

CVE: CVE-1999-1549

BID: 804