-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
             AUSCERT External Security Bulletin Redistribution

            ESB-2002.702 -- Debian Security Advisory DSA-210-1
                            lynx CRLF injection
                             13 December 2002

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                lynx
                        lynx-ssl
Vendor:                 Debian
Operating System:       Debian GNU/Linux 2.2
                        Debian GNU/Linux 3.0
                        Linux
                        UNIX
Impact:                 Reduced Security
Access Required:        Existing Account

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ------------------------------------------------------------------------
Debian Security Advisory DSA-210-1                   security@debian.org
http://www.debian.org/security/                         Wichert Akkerman
December 13, 2002
- - ------------------------------------------------------------------------


Package        : lynx, lynx-ssl
Problem type   : CRLF injection
Debian-specific: no

lynx (a text-only web browser) did not properly check for illegal
characters in all places, including processing of command line options,
which could be used to insert extra HTTP headers in a request.

For Debian GNU/Linux 2.2/potato this has been fixed in version 2.8.3-1.1
of the lynx package and version 2.8.3.1-1.1 of the lynx-ssl package.

For Debian GNU/Linux 3.0/woody this has been fixed in version 2.8.4.1b-3.2
of the lynx package and version 1:2.8.4.1b-3.1 of the lynx-ssl package.

- - ------------------------------------------------------------------------

Obtaining updates:

  By hand:
    wget URL
        will fetch the file for you.
    dpkg -i FILENAME.deb
        will install the fetched file.

  With apt:
    deb http://security.debian.org/ stable/updates main
        added to /etc/apt/sources.list will provide security updates

Additional information can be found on the Debian security webpages
at http://www.debian.org/security/

- - ------------------------------------------------------------------------


Debian GNU/Linux 2.2 alias potato
- - ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.


  Source archives:

    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.3.1.orig.tar.gz
      Size/MD5 checksum:  2058352 2ee38e4b05d587a787c33bff9085c098
    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.3.1-1.1.dsc
      Size/MD5 checksum:     1279 3eccb5692780db83f078013ff8796224
    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.3-1.1.dsc
      Size/MD5 checksum:     1229 2924513df600a7cc6b4d29987a325107
    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.3.orig.tar.gz
      Size/MD5 checksum:  2024975 0fc239287592e885231e4be2fb2cd755
    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.3-1.1.diff.gz
      Size/MD5 checksum:    20091 507a328f301a1c37471a69e60df4479d
    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.3.1-1.1.diff.gz
      Size/MD5 checksum:   101630 59d4dfb527584001374bebdcc9760623

  alpha architecture (DEC Alpha)

    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.3.1-1.1_alpha.deb
      Size/MD5 checksum:  1165112 dce2288ab84eaac8851c657ab271f5cd
    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.3-1.1_alpha.deb
      Size/MD5 checksum:  1155516 775381bbf1c7c5f3177b17369969fda7

  arm architecture (ARM)

    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.3.1-1.1_arm.deb
      Size/MD5 checksum:  1018784 ba8d2ee2271ebb56216e4f9c67690f6a
    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.3-1.1_arm.deb
      Size/MD5 checksum:  1006492 85a7c675d239cce67e4d7076d69e8c48

  i386 architecture (Intel ia32)

    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.3-1.1_i386.deb
      Size/MD5 checksum:   973310 9f591d8c7e97b1bd84da2f841397a75c
    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.3.1-1.1_i386.deb
      Size/MD5 checksum:   980678 ef6cf5f0e4a8781b14876639fafa78be

  m68k architecture (Motorola Mc680x0)

    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.3-1.1_m68k.deb
      Size/MD5 checksum:   928930 b77c252b5da24613fd6b24ee7b8f09f5
    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.3.1-1.1_m68k.deb
      Size/MD5 checksum:   938162 e3b5992515dfb3f537ee9ece56a05083

  powerpc architecture (PowerPC)

    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.3.1-1.1_powerpc.deb
      Size/MD5 checksum:  1026988 3453040226d6fde9fb23ff8334d5e382
    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.3-1.1_powerpc.deb
      Size/MD5 checksum:  1015372 c2e0c1e1026f7fd2053d2c09cab90be1

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.3-1.1_sparc.deb
      Size/MD5 checksum:  1015696 3a207988cadc086720029abf6a227954
    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.3.1-1.1_sparc.deb
      Size/MD5 checksum:  1028208 bf6725e66a603d0652a6a987f737c64b


Debian GNU/Linux 3.0 alias woody
- - --------------------------------

  Woody was released for alpha, arm, hppa, i386, ia64, m68k, mips, mipsel,
  powerpc, s390 and sparc.

  Source archives:

    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b.orig.tar.gz
      Size/MD5 checksum:  2557510 053a10f76b871e3944c11c7776da7f7a
    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.2.diff.gz
      Size/MD5 checksum:    14143 0d4c52fb301bc17ddc2f4f5117bf020b
    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.1.dsc
      Size/MD5 checksum:     1307 19488ce4d65e93b7ca412a3f3a818581
    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.2.dsc
      Size/MD5 checksum:     1221 768cb74ff2df353a07739ceacde62fe1
    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.1.diff.gz
      Size/MD5 checksum:    87306 d4cced8e81fb4ad0bf005d5ae04387b3

  alpha architecture (DEC Alpha)

    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.2_alpha.deb
      Size/MD5 checksum:  1610106 40e75977e49a5f96059129febf1e8bd7
    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.1_alpha.deb
      Size/MD5 checksum:  1617220 de2a07846520d29d8168624ecadb023d

  arm architecture (ARM)

    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.2_arm.deb
      Size/MD5 checksum:  1487560 35f377be3b161fb8235d4a0a18982ce1
    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.1_arm.deb
      Size/MD5 checksum:  1491566 6e2605111b5dc7164b4db2c542fe2dde

  hppa architecture (HP PA RISC)

    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.2_hppa.deb
      Size/MD5 checksum:  1555212 72b2a7385c8dd606107486349d7bed7a
    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.1_hppa.deb
      Size/MD5 checksum:  1559452 6cb03b8fbf8fa7a6eaaee52777a36737

  i386 architecture (Intel ia32)

    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.1_i386.deb
      Size/MD5 checksum:  1449936 c0818c607e10ab576f463eab64267e2e
    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.2_i386.deb
      Size/MD5 checksum:  1444654 c076ad1599549f031a50e220cecbedc1

  ia64 architecture (Intel ia64)

    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.2_ia64.deb
      Size/MD5 checksum:  1762384 fb7e808dc23dcf5676f350ee5de99b65
    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.1_ia64.deb
      Size/MD5 checksum:  1769046 75740213ea49a9eb3bcba91e477f2f44

  m68k architecture (Motorola Mc680x0)

    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.2_m68k.deb
      Size/MD5 checksum:  1405466 d0faf24997b42bb50ac6995cfb69f2f9

  mips architecture (MIPS (Big Endian))

    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.1_mips.deb
      Size/MD5 checksum:  1511738 332f842adc76b43e6b89296605ea5932
    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.2_mips.deb
      Size/MD5 checksum:  1507588 11722f38007efb06835c4092dad8489a

  mipsel architecture (MIPS (Little Endian))

    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.2_mipsel.deb
      Size/MD5 checksum:  1503806 479ff36c446a959d2817234ec4c7f2b3
    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.1_mipsel.deb
      Size/MD5 checksum:  1507614 ffff3c5c89164dc560159852f09968a5

  powerpc architecture (PowerPC)

    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.1_powerpc.deb
      Size/MD5 checksum:  1496782 ca05c2e570046afafb985a418d60c093
    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.2_powerpc.deb
      Size/MD5 checksum:  1490836 e12d4c0dc846b538bd7484e70b8da9c8

  s390 architecture (IBM S/390)

    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.2_s390.deb
      Size/MD5 checksum:  1453926 e728dd600feb2ebf07ee7e31196ea8da
    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.1_s390.deb
      Size/MD5 checksum:  1460742 6504cf5ee0e0feaf35b237b544873534

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.1_sparc.deb
      Size/MD5 checksum:  1497176 58f9a53667ef85fea0f0e1b07ff9c0e1
    http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.2_sparc.deb
      Size/MD5 checksum:  1492610 d987da73b4606999ec239d72ec00a30a

- - -- 
- - ----------------------------------------------------------------------------
Debian Security team <team@security.debian.org>
http://www.debian.org/security/
Mailing-List: debian-security-announce@lists.debian.org

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE9+R6iPLiSUC+jvC0RAumUAKCnCmPqeNaydB+wn7u8hpkdesm0zACeOx/i
+KPdCw5RNKljTnnRBTM00qM=
=Zb+W
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author\'s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business 
                hours which are GMT+10:00 (AEST).  On call after hours 
                for member emergencies only.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBPfngLCh9+71yA2DNAQEfHgP/VHHEhsTP97/l0dgOAw+zLev9FXRrp8cQ
9IWbOVuIvLHSyi9bXwUlcSCY5HQxWMJrb/zwACzWCB2VJmWwh4ZQ9sxCykSHi4D9
CVC8Ud/m1vsS3uN6hZlMvrE15/XJqLhMz7i5ge87F0KnEaNJTcE/26xGYK+z7cZM
EHZn0w2QZY0=
=jPhe
-----END PGP SIGNATURE-----