Critical severity9.8NVD Advisory· Published Oct 17, 2005· Updated Apr 16, 2026
CVE-2005-3120
CVE-2005-3120
Description
Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and earlier allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters.
Affected products
3cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
35- lists.grok.org.uk/pipermail/full-disclosure/2005-October/038019.htmlnvdBroken LinkPatchVendor Advisory
- securitytracker.com/idnvdBroken LinkThird Party AdvisoryVDB Entry
- support.avaya.com/elmodocs2/security/ASA-2006-010.htmnvdThird Party Advisory
- www.debian.org/security/2005/dsa-874nvdMailing ListThird Party Advisory
- www.debian.org/security/2005/dsa-876nvdMailing ListThird Party Advisory
- www.debian.org/security/2006/dsa-1085nvdMailing ListThird Party Advisory
- www.gentoo.org/security/en/glsa/glsa-200510-15.xmlnvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2005-803.htmlnvdBroken LinkVendor Advisory
- www.securityfocus.com/archive/1/419763/100/0/threadednvdBroken LinkThird Party AdvisoryVDB Entry
- www.securityfocus.com/archive/1/435689/30/4740/threadednvdBroken LinkThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/15117nvdBroken LinkThird Party AdvisoryVDB Entry
- ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.7/SCOSA-2006.7.txtnvdBroken Link
- ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.47/SCOSA-2005.47.txtnvdBroken Link
- lists.trustix.org/pipermail/tsl-announce/2005-October/000354.htmlnvdBroken Link
- secunia.com/advisories/17150nvdBroken Link
- secunia.com/advisories/17216nvdBroken Link
- secunia.com/advisories/17230nvdBroken Link
- secunia.com/advisories/17231nvdBroken Link
- secunia.com/advisories/17238nvdBroken Link
- secunia.com/advisories/17248nvdBroken Link
- secunia.com/advisories/17340nvdBroken Link
- secunia.com/advisories/17360nvdBroken Link
- secunia.com/advisories/17444nvdBroken Link
- secunia.com/advisories/17445nvdBroken Link
- secunia.com/advisories/17480nvdBroken Link
- secunia.com/advisories/18376nvdBroken Link
- secunia.com/advisories/18584nvdBroken Link
- secunia.com/advisories/20383nvdBroken Link
- slackware.com/security/viewer.phpnvdBroken Link
- www.novell.com/linux/security/advisories/2005_25_sr.htmlnvdBroken Link
- www.openpkg.org/security/OpenPKG-SA-2005.026-lynx.htmlnvdBroken Link
- bugzilla.redhat.com/bugzilla/show_bug.cginvdIssue Tracking
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9257nvdBroken Link
- usn.ubuntu.com/206-1/nvdBroken Link
News mentions
0No linked articles in our index yet.