6.8
CVSSv2

CVE-2010-2810

Published: 20/08/2010 Updated: 17/08/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 606
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in the convert_to_idna function in WWW/Library/Implementation/HTParse.c in Lynx 2.8.8dev.1 up to and including 2.8.8dev.4 allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed URL containing a % (percent) character in the domain name.

Vulnerable Product Search on Vulmon Subscribe to Product

lynx lynx 2.8.8

Vendor Advisories

Debian Bug report logs - #594300 CVE-2010-2810: Heap-based buffer overflow Package: lynx-cur; Maintainer for lynx-cur is Debian Lynx Packaging Team <pkg-lynx-maint@listsaliothdebianorg>; Source for lynx-cur is src:lynx (PTS, buildd, popcon) Reported by: Giuseppe Iuculano <iuculano@debianorg> Date: Wed, 25 Aug 201 ...
Two security issues were fixed in Lynx ...