summaryrefslogtreecommitdiff
blob: 9c7a98540a3372a4ddcd7ea63103903835e4479d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200612-16">
  <title>Links: Arbitrary Samba command execution</title>
  <synopsis>
    Links does not properly validate "smb://" URLs, making it vulnerable to the
    execution of arbitrary Samba commands.
  </synopsis>
  <product type="ebuild">links</product>
  <announced>2006-12-14</announced>
  <revised count="01">2006-12-14</revised>
  <bug>157028</bug>
  <access>remote</access>
  <affected>
    <package name="www-client/links" auto="yes" arch="*">
      <unaffected range="ge">2.1_pre26</unaffected>
      <vulnerable range="lt">2.1_pre26</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    Links is a web browser running in both graphics and text modes.
    </p>
  </background>
  <description>
    <p>
    Teemu Salmela discovered that Links does not properly validate "smb://"
    URLs when it runs smbclient commands.
    </p>
  </description>
  <impact type="normal">
    <p>
    A remote attacker could entice a user to browse to a specially crafted
    "smb://" URL and execute arbitrary Samba commands, which would allow
    the overwriting of arbitrary local files or the upload or the download
    of arbitrary files. This vulnerability can be exploited only if
    "smbclient" is installed on the victim's computer, which is provided by
    the "samba" Gentoo package.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All Links users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=www-client/links-2.1_pre26"</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5925">CVE-2006-5925</uri>
  </references>
  <metadata tag="requester" timestamp="2006-12-10T21:05:34Z">
    vorlon
  </metadata>
  <metadata tag="submitter" timestamp="2006-12-12T00:14:43Z">
    falco
  </metadata>
  <metadata tag="bugReady" timestamp="2006-12-13T14:10:35Z">
    vorlon
  </metadata>
</glsa>