CVE-2004-1617Improper Input Validation in Lynx

Severity
5.0MEDIUMNVD
EPSS
3.7%
top 12.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 18
Latest updateApr 29

Description

Lynx, lynx-ssl, and lynx-cur before 2.8.6dev.8 allow remote attackers to cause a denial of service (infinite loop) via a web page or HTML email that contains invalid HTML including (1) a TEXTAREA tag with a large COLS value and (2) a large tag name in an element that is not terminated, as demonstrated by mangleme. NOTE: a followup suggests that the relevant trigger for this issue is the large COLS value.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/lynx< lynx 2.8.5-2sarge1.2 (bookworm)
Debianuniversity_of_kansas/lynx< 2.8.5-2sarge1.2+3
NVDuniversity_of_kansas/lynx16 versions+15

🔴Vulnerability Details

2
GHSA
GHSA-j8fp-ff64-g7r6: Lynx, lynx-ssl, and lynx-cur before 22022-04-29
OSV
CVE-2004-1617: Lynx, lynx-ssl, and lynx-cur before 22004-10-18

📋Vendor Advisories

1
Debian
CVE-2004-1617: lynx - Lynx, lynx-ssl, and lynx-cur before 2.8.6dev.8 allow remote attackers to cause a...2004