Description of problem: lynx is vulnerable to CRLF injection: http://www.mail-archive.com/bugtraq@securityfocus.com/msg08897.html Version-Release number of selected component (if applicable): 2.8.4-17 How reproducible: 100% Steps to Reproduce: 1. lynx "http://www.redhat.com HTTP/1.0 Host: www.microsoft.com " Actual results: Microsoft's front page. Expected results: Invalid URL. Additional info:
Created attachment 90035 [details] Better test case Use this test procedure instead. 1. ./test-lynx.sh 2. Examine output. Fail if any of the numbered output lines are 'Host: www.redhat.com' (the script will say 'FAIL' too).
An errata has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2003-030.html