85179 2002-11-22  15:58  /164 rader/  <security@caldera.com>
Importerad: 2002-11-22  15:58  av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Extern mottagare: announce@lists.caldera.com
Extern mottagare: security-alerts@linuxsecurity.com
Extern mottagare: full-disclosure@lists.netsys.com
Externa svar till: please_reply_to_security@caldera.com
Mottagare: Bugtraq (import) <2492>
Ärende: Security Update: [CSSA-2002-049.0] Linux: lynx CRLF injection vulnerability
------------------------------------------------------------
To: bugtraq@securityfocus.com announce@lists.caldera.com security-alerts@linuxsecurity.com full-disclosure@lists.netsys.com


______________________________________________________________________________

			SCO Security Advisory

Subject:		Linux: lynx CRLF injection vulnerability
Advisory number: 	CSSA-2002-049.0
Issue date: 		2002 November 18
Cross reference:
______________________________________________________________________________


1. Problem Description

	If lynx is given a url with some special characters on the
	command line, it will include faked headers in the HTTP
	query. This feature can be used to force scripts (that use
	Lynx for downloading files) to access the wrong site on a web
	server with multiple virtual hosts.


2. Vulnerable Supported Versions

	System				Package
	----------------------------------------------------------------------

	OpenLinux 3.1.1 Server		prior to lynx-2.8.4-1.i386.rpm

	OpenLinux 3.1.1 Workstation	prior to lynx-2.8.4-1.i386.rpm

	OpenLinux 3.1 Server		prior to lynx-2.8.4-1.i386.rpm

	OpenLinux 3.1 Workstation	prior to lynx-2.8.4-1.i386.rpm


3. Solution

	The proper solution is to install the latest packages. Many
	customers find it easier to use the Caldera System Updater,
	called cupdate (or kcupdate under the KDE environment), to
	update these packages rather than downloading and installing
	them by hand.


4. OpenLinux 3.1.1 Server

	4.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2002-049.0/RPMS

	4.2 Packages

	86aa0c385c7b4789aa33fe57dc209490	lynx-2.8.4-1.i386.rpm

	4.3 Installation

	rpm -Fvh lynx-2.8.4-1.i386.rpm

	4.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2002-049.0/SRPMS

	4.5 Source Packages

	2b48e8130471668d9562fc10a5969d02	lynx-2.8.4-1.src.rpm


5. OpenLinux 3.1.1 Workstation

	5.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2002-049.0/RPMS

	5.2 Packages

	bd467354192cc42c87abb4be5650749f	lynx-2.8.4-1.i386.rpm

	5.3 Installation

	rpm -Fvh lynx-2.8.4-1.i386.rpm

	5.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2002-049.0/SRPMS

	5.5 Source Packages

	cf32748b277276e5f43a6f4111bb1ff2	lynx-2.8.4-1.src.rpm


6. OpenLinux 3.1 Server

	6.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2002-049.0/RPMS

	6.2 Packages

	02bb0b77cf7f6014c6ad5a386e5bc763	lynx-2.8.4-1.i386.rpm

	6.3 Installation

	rpm -Fvh lynx-2.8.4-1.i386.rpm

	6.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2002-049.0/SRPMS

	6.5 Source Packages

	61828e229e2794c46376c95354c8859c	lynx-2.8.4-1.src.rpm


7. OpenLinux 3.1 Workstation

	7.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Workstation/CSSA-2002-049.0/RPMS

	7.2 Packages

	d0b3580c93c3790d88eb0c4d18a75e58	lynx-2.8.4-1.i386.rpm

	7.3 Installation

	rpm -Fvh lynx-2.8.4-1.i386.rpm

	7.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Workstation/CSSA-2002-049.0/SRPMS

	7.5 Source Packages

	2c321eabba1a1d8172893de42f58af59	lynx-2.8.4-1.src.rpm


8. References

	Specific references for this advisory:
		none

	SCO security resources:
		http://www.sco.com/support/security/index.html

	This security fix closes SCO incidents sr868660, fz525986,
	erg712118.


9. Disclaimer

	SCO is not responsible for the misuse of any of the
	information we provide on this website and/or through our
	security advisories. Our advisories are a service to our
	customers intended to promote secure installation and use of
	SCO products.


10. Acknowledgements

	SCO would like to thank Ulf Harnhammar for the discovery and
	analysis of this vulnerability.

______________________________________________________________________________
(85179) / <security@caldera.com>/---------(Ombruten)
Bilaga (application/pgp-signature) i text 85180
85180 2002-11-22  15:58  /9 rader/  <security@caldera.com>
Importerad: 2002-11-22  15:58  av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Extern mottagare: announce@lists.caldera.com
Extern mottagare: security-alerts@linuxsecurity.com
Extern mottagare: full-disclosure@lists.netsys.com
Externa svar till: please_reply_to_security@caldera.com
Mottagare: Bugtraq (import) <2493>
Bilaga (text/plain) till text 85179
Ärende: Bilaga till: Security Update: [CSSA-2002-049.0] Linux: lynx CRLF injection vulnerability
------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAj3ZhUIACgkQbluZssSXDTFNygCgmnS4g5fkEUSCnkd8vyq9WtXC
nbgAoO21y7RUBVTEwdTe0+fp8fR+YFBP
=Kp+N
-----END PGP SIGNATURE-----
(85180) / <security@caldera.com>/-------------------