CVE-2016-9179

NameCVE-2016-9179
Descriptionlynx: It was found that Lynx doesn't parse the authority component of the URL correctly when the host name part ends with '?', and could instead be tricked into connecting to a different host.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-719-1
NVD severitymedium
Debian Bugs843258

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
lynx (PTS)stretch2.8.9dev11-1fixed
buster2.8.9rel.1-3fixed
bullseye, sid2.9.0dev.6-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
lynxsource(unstable)2.8.9dev11-1843258
lynx-cursourcewheezy2.8.8dev.12-2+deb7u1DLA-719-1
lynx-cursource(unstable)(unfixed)

Notes

[jessie] - lynx-cur <no-dsa> (Minor issue)
https://www.openwall.com/lists/oss-security/2016/11/03/4
Slight mitigation and documentation improvement was done in 2.8.9dev.10 upstream
the uplaod to unstable as 2.8.9dev10-1

Search for package or bug name: Reporting problems