Subject: Re: (fwd) lynx - someone is deaf and blind ;)
To: None <email@example.com>
From: Thomas Klausner <firstname.lastname@example.org>
Date: 03/09/2000 03:50:05
There also was a followup that it's nearly impossible to exploit, so
I'll just forget about it again:
==begin forward (headers shortened)
From: emsi@IT.PL (Mariusz Woloszyn)
Subject: Re: lynx - someone is deaf and blind ;)
Date: 8 Mar 2000 08:55:33 +0100
On Sat, 4 Mar 2000, Kris Kennaway wrote:
> > extremely long URLs. I'm not going to give more examples here, as I'm
> > afraid I might miss one or two that won't be fixed - developers, use your
> > head, take a look at the code and fix every suspected piece of code, not
> > only already published / described bugs.
> I have just disabled the lynx port/package in FreeBSD. We won't be
> shipping it in FreeBSD 4.0, or until this gets addressed. It's a shame
> because it's such a popular and useful tool, but the risk to users is just
> too great.
> Thanks for notifying the world of these problems :)
I was trying to exploit lynx bug several times.
It's true that lynx segfaults on long URLs, but exploiting it is (IMHO)
impossible because lynx strips all nonprintable characters thus smugling
RET address is impossible. I have never heard about ASCII only shellcode
I assume lynx bugs are unexploitable...
P.S. You can compile lynx using StackGuard also (AFAIK only under Linux).
Internet Security Specialist, Internet Partners, GTS Poland
Thomas Klausner - email@example.com
Programming is like sex:
One mistake and you have to support for a lifetime.