USN-851-1: Elinks vulnerabilities
21 October 2009
Elinks vulnerabilities
Releases
Packages
- elinks -
Details
Teemu Salmela discovered that Elinks did not properly validate input when
processing smb:// URLs. If a user were tricked into viewing a malicious
website and had smbclient installed, a remote attacker could execute
arbitrary code with the privileges of the user invoking the program.
(CVE-2006-5925)
Jakub Wilk discovered a logic error in Elinks, leading to a buffer
overflow. If a user were tricked into viewing a malicious website, a remote
attacker could cause a denial of service via application crash, or possibly
execute arbitrary code with the privileges of the user invoking the
program. (CVE-2008-7224)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 6.06
After a standard system upgrade you need to restart Elinks to effect
the necessary changes.