USN-851-1: Elinks vulnerabilities

Ubuntu Security Notice USN-851-1

21st October, 2009

elinks vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 6.06 LTS

Software description

  • elinks

Details

Teemu Salmela discovered that Elinks did not properly validate input when
processing smb:// URLs. If a user were tricked into viewing a malicious
website and had smbclient installed, a remote attacker could execute
arbitrary code with the privileges of the user invoking the program.
(CVE-2006-5925)

Jakub Wilk discovered a logic error in Elinks, leading to a buffer
overflow. If a user were tricked into viewing a malicious website, a remote
attacker could cause a denial of service via application crash, or possibly
execute arbitrary code with the privileges of the user invoking the
program. (CVE-2008-7224)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 6.06 LTS:
elinks-lite 0.10.6-1ubuntu3.4
elinks 0.10.6-1ubuntu3.4

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system upgrade you need to restart Elinks to effect
the necessary changes.

References

CVE-2006-5925, CVE-2008-7224