Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and earlier allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters.
References
Link Providers
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.7/SCOSA-2006.7.txt cve-icon cve-icon
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.47/SCOSA-2005.47.txt cve-icon cve-icon
http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038019.html cve-icon cve-icon
http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html cve-icon cve-icon
http://secunia.com/advisories/17150 cve-icon cve-icon
http://secunia.com/advisories/17216 cve-icon cve-icon
http://secunia.com/advisories/17230 cve-icon cve-icon
http://secunia.com/advisories/17231 cve-icon cve-icon
http://secunia.com/advisories/17238 cve-icon cve-icon
http://secunia.com/advisories/17248 cve-icon cve-icon
http://secunia.com/advisories/17340 cve-icon cve-icon
http://secunia.com/advisories/17360 cve-icon cve-icon
http://secunia.com/advisories/17444 cve-icon cve-icon
http://secunia.com/advisories/17445 cve-icon cve-icon
http://secunia.com/advisories/17480 cve-icon cve-icon
http://secunia.com/advisories/18376 cve-icon cve-icon
http://secunia.com/advisories/18584 cve-icon cve-icon
http://secunia.com/advisories/20383 cve-icon cve-icon
http://securitytracker.com/id?1015065 cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.423056 cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2006-010.htm cve-icon cve-icon
http://www.debian.org/security/2005/dsa-874 cve-icon cve-icon
http://www.debian.org/security/2005/dsa-876 cve-icon cve-icon
http://www.debian.org/security/2006/dsa-1085 cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200510-15.xml cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2005:186 cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2005_25_sr.html cve-icon cve-icon
http://www.openpkg.org/security/OpenPKG-SA-2005.026-lynx.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2005-803.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/419763/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/435689/30/4740/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/15117 cve-icon cve-icon
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170253 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2005-3120 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9257 cve-icon cve-icon
https://usn.ubuntu.com/206-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2005-3120 cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: debian

Published: 2005-10-17T04:00:00

Updated: 2024-08-07T23:01:58.162Z

Reserved: 2005-10-03T00:00:00

Link: CVE-2005-3120

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2005-10-17T20:06:00.000

Modified: 2024-02-02T14:00:54.823

Link: CVE-2005-3120

cve-icon Redhat

Severity : Critical

Publid Date: 2005-10-17T00:00:00Z

Links: CVE-2005-3120 - Bugzilla