CVE-2016-9436

parsetagx.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to a <i> tag.
References
Link Resource
http://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/11/18/3 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/94407 Third Party Advisory VDB Entry
https://github.com/tats/w3m/commit/33509cc81ec5f2ba44eb6fd98bd5c1b5873e46bd Issue Tracking Technical Description Patch
https://github.com/tats/w3m/issues/16 Issue Tracking Patch Third Party Advisory
https://security.gentoo.org/glsa/201701-08 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*

History

29 Dec 2023, 18:38

Type Values Removed Values Added
CPE cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:* cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*

Information

Published : 2017-01-20 15:59

Updated : 2024-02-04 19:11


NVD link : CVE-2016-9436

Mitre link : CVE-2016-9436

CVE.ORG link : CVE-2016-9436


JSON object : View

Products Affected

tats

  • w3m

opensuse_project

  • leap

opensuse

  • leap
CWE
CWE-20

Improper Input Validation