Lynx 2.8 – Remote Buffer Overflow

Lynx 2.8 – Remote Buffer Overflow

漏洞ID 1053370 漏洞类型
发布时间 1998-05-03 更新时间 1998-05-03
图片[1]-Lynx 2.8 – Remote Buffer Overflow-安全小百科CVE编号 N/A
图片[2]-Lynx 2.8 – Remote Buffer Overflow-安全小百科CNNVD-ID N/A
漏洞平台 Multiple CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/19081
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/100/info

There exists a buffer overflow in Lynx's built-in mailer that can be exploited when when the victim tries to follow a hyperlink. Lynx makes blind assumption on e-mail address length, and sprintfs it into 512-bytes long buffer. The vulnerability is in LMail.c as part of the processing of "mailto:" URLs.

<a href="mailto:AAAAAAAAA[...about 3 kB...]AAAA">MAIL ME!</a>

(you should use over 2 kB of 'A's, because there are also other small
buffers on lynx's stack at the time)

相关推荐: APC PowerChute Plus 4.2.2 – Denial of Service

APC PowerChute Plus 4.2.2 – Denial of Service 漏洞ID 1053367 漏洞类型 发布时间 1998-04-10 更新时间 1998-04-10 CVE编号 N/A CNNVD-ID N/A 漏洞平台 Linux …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享