|
Message-ID: <Pine.GSO.4.51.0810271235340.1641@faron.mitre.org> Date: Mon, 27 Oct 2008 12:35:38 -0400 (EDT) From: "Steven M. Christey" <coley@...us.mitre.org> To: oss-security <oss-security@...ts.openwall.com> cc: coley@...re.org Subject: Re: CVE request: lynx (old) .mailcap handling flaw ====================================================== Name: CVE-2006-7234 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7234 Reference: CONFIRM:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=396949 Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=214205 Reference: MLIST:[oss-security] 20081025 CVE request: lynx (old) .mailcap handling flaw Reference: URL:http://www.openwall.com/lists/oss-security/2008/10/25/3 Untrusted search path vulnerability in Lynx before 2.8.6rel.4 allows local users to execute arbitrary code via malicious (1) .mailcap and (2) mime.types files in the current working directory.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.