CVE-2016-9423Improper Restriction of Operations within the Bounds of a Memory Buffer in W3M

Severity
8.8HIGHNVD
EPSS
1.0%
top 22.49%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 12
Latest updateMay 17

Description

An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Heap-based buffer overflow in w3m allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTML page.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

Debiantats/w3m< 0.5.3-30+3
NVDtats/w3m0.5.3-30

Patches

🔴Vulnerability Details

3
GHSA
GHSA-2h42-pg53-gv5w: An issue was discovered in the Tatsuya Kinoshita w3m fork before 02022-05-17
CVEList
CVE-2016-9423: An issue was discovered in the Tatsuya Kinoshita w3m fork before 02016-12-12
OSV
CVE-2016-9423: An issue was discovered in the Tatsuya Kinoshita w3m fork before 02016-12-12

📋Vendor Advisories

3
Ubuntu
w3m vulnerabilities2017-03-02
Red Hat
w3m: Malformed html tag heap-buffer overflow2016-08-12
Debian
CVE-2016-9423: w3m - An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Heap-...2016

💬Community

1
Bugzilla
CVE-2016-9423 w3m: Malformed html tag heap-buffer overflow2016-11-29
CVE-2016-9423 — Tats W3M vulnerability | cvebase