Description
Lynx, lynx-ssl, and lynx-cur before 2.8.6dev.8 allow remote attackers to cause a denial of service (infinite loop) via a web page or HTML email that contains invalid HTML including (1) a TEXTAREA tag with a large COLS value and (2) a large tag name in an element that is not terminated, as demonstrated by mangleme. NOTE: a followup suggests that the relevant trigger for this issue is the large COLS value.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1076-1 | New lynx packages fix denial of service |
Debian DSA |
DSA-1077-1 | New lynx-ssl packages fix denial of service |
Debian DSA |
DSA-1085-1 | New lynx-cur packages fix several vulnerabilities |
EUVD |
EUVD-2004-1611 | Lynx, lynx-ssl, and lynx-cur before 2.8.6dev.8 allow remote attackers to cause a denial of service (infinite loop) via a web page or HTML email that contains invalid HTML including (1) a TEXTAREA tag with a large COLS value and (2) a large tag name in an element that is not terminated, as demonstrated by mangleme. NOTE: a followup suggests that the relevant trigger for this issue is the large COLS value. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T01:00:36.960Z
Reserved: 2005-02-20T00:00:00.000Z
Link: CVE-2004-1617
No data.
Status : Modified
Published: 2004-10-18T04:00:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2004-1617
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD