An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Heap-based buffer overflow in w3m allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTML page.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2016/11/18/3 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/94407 | |
https://github.com/tats/w3m/blob/master/ChangeLog | Issue Tracking Patch |
https://github.com/tats/w3m/issues/9 | Issue Tracking Patch |
https://security.gentoo.org/glsa/201701-08 |
Configurations
History
29 Dec 2023, 18:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:* |
Information
Published : 2016-12-12 02:59
Updated : 2024-02-04 19:11
NVD link : CVE-2016-9423
Mitre link : CVE-2016-9423
CVE.ORG link : CVE-2016-9423
JSON object : View
Products Affected
tats
- w3m
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer