> It seems that the netscape problem found by darkspyrit (oversized 
> arguments to CGI's via GET) might also be a vulnerability issue in 
> other browser software. For fun, I tried accessing the sample exploit 
> page at http://www.beavuh.org/nscape.htm 
> with lynx, and nothing happened, but when I tried saving the page 
> (default key 'p') to disk, it got a segv.. 
> this happened using version 2.8.1pre.9 

The current version of lynx is 2.8.2 (2.8.3 in development)
It's available at
        http://lynx.browser.org
        http://sol.slcc.edu/lynx/release
        ftp://lynx.isc.org/lynx-2.8.2
  
(it doesn't break when I view/print the page)

> Here is a backtrace from the lynx core file: 
> (gdb) bt 
> #0  0x1ad811 in __kill () 
> #1  0x1ad63f in raise (sig=6) at ../sysdeps/posix/raise.c:27 
> #2  0x1ae84f in abort () at ../sysdeps/generic/abort.c:83 
> #3  0x80602e8 in _start () 
> #4  0xc0de0001 in ?? () 
>  
> ________________________ 
> [EMAIL PROTECTED] 
> http://1337.tsx.org 
> mkdir -p `perl -e 'printf "a/" x 1000'` 
>  


-- 
Thomas E. Dickey
[EMAIL PROTECTED]
http://www.clark.net/pub/dickey

Reply via email to