CVE-2004-1617
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
18/10/2004
Last modified:
03/04/2025
Description
Lynx, lynx-ssl, and lynx-cur before 2.8.6dev.8 allow remote attackers to cause a denial of service (infinite loop) via a web page or HTML email that contains invalid HTML including (1) a TEXTAREA tag with a large COLS value and (2) a large tag name in an element that is not terminated, as demonstrated by mangleme. NOTE: a followup suggests that the relevant trigger for this issue is the large COLS value.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:university_of_kansas:lynx:2.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:university_of_kansas:lynx:2.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:university_of_kansas:lynx:2.8.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:university_of_kansas:lynx:2.8.2_rel1:*:*:*:*:*:*:* | ||
cpe:2.3:a:university_of_kansas:lynx:2.8.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:university_of_kansas:lynx:2.8.3_dev22:*:*:*:*:*:*:* | ||
cpe:2.3:a:university_of_kansas:lynx:2.8.3_pre5:*:*:*:*:*:*:* | ||
cpe:2.3:a:university_of_kansas:lynx:2.8.3_rel1:*:*:*:*:*:*:* | ||
cpe:2.3:a:university_of_kansas:lynx:2.8.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:university_of_kansas:lynx:2.8.4_rel1:*:*:*:*:*:*:* | ||
cpe:2.3:a:university_of_kansas:lynx:2.8.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:university_of_kansas:lynx:2.8.5_dev2:*:*:*:*:*:*:* | ||
cpe:2.3:a:university_of_kansas:lynx:2.8.5_dev3:*:*:*:*:*:*:* | ||
cpe:2.3:a:university_of_kansas:lynx:2.8.5_dev4:*:*:*:*:*:*:* | ||
cpe:2.3:a:university_of_kansas:lynx:2.8.5_dev5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lcamtuf.coredump.cx/mangleme/gallery/
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027709.html
- http://marc.info/?l=bugtraq&m=109811406620511&w=2
- http://secunia.com/advisories/20383
- http://securitytracker.com/id?1011809=
- http://www.debian.org/security/2006/dsa-1076
- http://www.debian.org/security/2006/dsa-1077
- http://www.debian.org/security/2006/dsa-1085
- http://www.securityfocus.com/archive/1/435689/30/4740/threaded
- http://www.securityfocus.com/bid/11443
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17804
- http://lcamtuf.coredump.cx/mangleme/gallery/
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027709.html
- http://marc.info/?l=bugtraq&m=109811406620511&w=2
- http://secunia.com/advisories/20383
- http://securitytracker.com/id?1011809=
- http://www.debian.org/security/2006/dsa-1076
- http://www.debian.org/security/2006/dsa-1077
- http://www.debian.org/security/2006/dsa-1085
- http://www.securityfocus.com/archive/1/435689/30/4740/threaded
- http://www.securityfocus.com/bid/11443
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17804