parsetagx.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to a <i> tag.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/11/18/3 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/94407 | Third Party Advisory VDB Entry |
https://github.com/tats/w3m/commit/33509cc81ec5f2ba44eb6fd98bd5c1b5873e46bd | Issue Tracking Technical Description Patch |
https://github.com/tats/w3m/issues/16 | Issue Tracking Patch Third Party Advisory |
https://security.gentoo.org/glsa/201701-08 | Third Party Advisory VDB Entry |
Configurations
History
29 Dec 2023, 18:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:* |
Information
Published : 2017-01-20 15:59
Updated : 2024-02-04 19:11
NVD link : CVE-2016-9436
Mitre link : CVE-2016-9436
CVE.ORG link : CVE-2016-9436
JSON object : View
Products Affected
tats
- w3m
opensuse_project
- leap
opensuse
- leap
CWE
CWE-20
Improper Input Validation