CVE-2016-9179

NameCVE-2016-9179
Descriptionlynx: It was found that Lynx doesn't parse the authority component of the URL correctly when the host name part ends with '?', and could instead be tricked into connecting to a different host.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-719-1
NVD severitymedium (attack range: remote)
Debian Bugs843258

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
lynx (PTS)stretch2.8.9dev11-1fixed
buster, sid2.8.9dev16-1fixed
lynx-cur (PTS)wheezy2.8.8dev.12-2vulnerable
wheezy (security)2.8.8dev.12-2+deb7u1fixed
jessie2.8.9dev1-2+deb8u1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
lynxsource(unstable)2.8.9dev11-1medium843258
lynx-cursource(unstable)(unfixed)medium
lynx-cursourcewheezy2.8.8dev.12-2+deb7u1mediumDLA-719-1

Notes

[jessie] - lynx-cur <no-dsa> (Minor issue)
http://www.openwall.com/lists/oss-security/2016/11/03/4
Slight mitigation and documentation improvement was done in 2.8.9dev.10 upstream
the uplaod to unstable as 2.8.9dev10-1

Search for package or bug name: Reporting problems