Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 16 Mar 2000 17:30:19 +0900
From:      kjm@rins.ryukoku.ac.jp (KOJIMA Hajime)
To:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory: FreeBSD-SA-00:08.lynx
Message-ID:  <92790.953195419@ideon.st.ryukoku.ac.jp>
In-Reply-To: Your message of "Wed, 15 Mar 2000 09:34:43 PST"
References:  <20000315173443.F231737BA56@hub.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
In <20000315173443.F231737BA56@hub.freebsd.org>,
FreeBSD Security Officer wrote:
| FreeBSD-SA-00:08                                           Security Advisory
...
| Topic:		Lynx ports contain numerous buffer overflows
...
| II.  Problem Description
| 
| The lynx software is written in a very insecure style and contains numerous
| potential and several proven security vulnerabilities (publicized on the
| BugTraq mailing list) exploitable by a malicious server.
| 
| The lynx ports are not installed by default, nor are they "part of FreeBSD"
| as such: they are part of the FreeBSD ports collection, which contains over
| 3100 third-party applications in a ready-to-install format.

  But, /stand/sysinstall still use lynx as default text browser.
  If you want to read HTML documents in sysinstall, /stand/sysinstall
  will go to install lynx package automatically (and it will fail in
  4.0-RELEASE).   

---- from release/sysinstall/install.c revision 1.268:
    variable_set2(VAR_BROWSER_PACKAGE,          "lynx", 0);
    variable_set2(VAR_BROWSER_BINARY,           "/usr/local/bin/lynx", 0);
----

----
KOJIMA Hajime - Ryukoku University, Seta, Ootsu, Shiga, 520-2194 Japan
[Office] kjm@rins.ryukoku.ac.jp, http://www.st.ryukoku.ac.jp/~kjm/


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?92790.953195419>