CRLF injection vulnerability in Lynx 2.8.4 and earlier allows remote attackers to inject false HTTP headers into an HTTP request that is provided on the command line, via a URL containing encoded carriage return, line feed, and other whitespace characters.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
CRLF injection vulnerability in Lynx 2.8.4 and earlier allows remote attackers to inject false HTTP headers into an HTTP request that is provided on the command line, via a URL containing encoded carriage return, line feed, and other whitespace characters.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:023 | vendor-advisory x_refsource_MANDRAKE |
http://www.redhat.com/support/errata/RHSA-2003-030.html | vendor-advisory x_refsource_REDHAT |
http://www.trustix.net/errata/misc/2002/TSL-2002-0085-lynx-ssl.asc.txt | vendor-advisory x_refsource_TRUSTIX |
http://www.iss.net/security_center/static/9887.php | vdb-entry x_refsource_XF |
http://www.redhat.com/support/errata/RHSA-2003-029.html | vendor-advisory x_refsource_REDHAT |
http://marc.info/?l=bugtraq&m=103003793418021&w=2 | mailing-list x_refsource_BUGTRAQ |
http://marc.info/?l=bugtraq&m=102978118411977&w=2 | mailing-list x_refsource_BUGTRAQ |
http://www.securityfocus.com/bid/5499 | vdb-entry x_refsource_BID |
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-049.0.txt | vendor-advisory x_refsource_CALDERA |
http://www.debian.org/security/2002/dsa-210 | vendor-advisory x_refsource_DEBIAN |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:023 | vendor-advisory x_refsource_MANDRAKE x_transferred |
http://www.redhat.com/support/errata/RHSA-2003-030.html | vendor-advisory x_refsource_REDHAT x_transferred |
http://www.trustix.net/errata/misc/2002/TSL-2002-0085-lynx-ssl.asc.txt | vendor-advisory x_refsource_TRUSTIX x_transferred |
http://www.iss.net/security_center/static/9887.php | vdb-entry x_refsource_XF x_transferred |
http://www.redhat.com/support/errata/RHSA-2003-029.html | vendor-advisory x_refsource_REDHAT x_transferred |
http://marc.info/?l=bugtraq&m=103003793418021&w=2 | mailing-list x_refsource_BUGTRAQ x_transferred |
http://marc.info/?l=bugtraq&m=102978118411977&w=2 | mailing-list x_refsource_BUGTRAQ x_transferred |
http://www.securityfocus.com/bid/5499 | vdb-entry x_refsource_BID x_transferred |
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-049.0.txt | vendor-advisory x_refsource_CALDERA x_transferred |
http://www.debian.org/security/2002/dsa-210 | vendor-advisory x_refsource_DEBIAN x_transferred |
CRLF injection vulnerability in Lynx 2.8.4 and earlier allows remote attackers to inject false HTTP headers into an HTTP request that is provided on the command line, via a URL containing encoded carriage return, line feed, and other whitespace characters.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 5.0 | MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
CWE ID | Type | Source |
---|---|---|
NVD-CWE-Other | Primary | nvd@nist.gov |