Date: Thu, 16 Mar 2000 17:30:19 +0900 From: kjm@rins.ryukoku.ac.jp (KOJIMA Hajime) To: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory: FreeBSD-SA-00:08.lynx Message-ID: <92790.953195419@ideon.st.ryukoku.ac.jp> In-Reply-To: Your message of "Wed, 15 Mar 2000 09:34:43 PST" References: <20000315173443.F231737BA56@hub.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
In <20000315173443.F231737BA56@hub.freebsd.org>, FreeBSD Security Officer wrote: | FreeBSD-SA-00:08 Security Advisory ... | Topic: Lynx ports contain numerous buffer overflows ... | II. Problem Description | | The lynx software is written in a very insecure style and contains numerous | potential and several proven security vulnerabilities (publicized on the | BugTraq mailing list) exploitable by a malicious server. | | The lynx ports are not installed by default, nor are they "part of FreeBSD" | as such: they are part of the FreeBSD ports collection, which contains over | 3100 third-party applications in a ready-to-install format. But, /stand/sysinstall still use lynx as default text browser. If you want to read HTML documents in sysinstall, /stand/sysinstall will go to install lynx package automatically (and it will fail in 4.0-RELEASE). ---- from release/sysinstall/install.c revision 1.268: variable_set2(VAR_BROWSER_PACKAGE, "lynx", 0); variable_set2(VAR_BROWSER_BINARY, "/usr/local/bin/lynx", 0); ---- ---- KOJIMA Hajime - Ryukoku University, Seta, Ootsu, Shiga, 520-2194 Japan [Office] kjm@rins.ryukoku.ac.jp, http://www.st.ryukoku.ac.jp/~kjm/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?92790.953195419>