Lynx Internal URL Verification Code Execution

low Nessus Network Monitor Plugin ID 1739

Synopsis

The remote host is using Lynx as a web browser.

Description

The remote host is using Lynx as a web browser. The version used is vulnerable to a bug which may allow a rogue web site to be considered as a local page. An attacker may eventually use this flaw to execute arbitrary code on this host, with the privileges of the user running lynx.

Solution

No solution is known at this time.

Plugin Details

Severity: Low

ID: 1739

Family: Web Clients

Published: 8/20/2004

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:lynx:lynx

Reference Information

CVE: CVE-1999-1549

BID: 804