CVE-2016-9424Improper Restriction of Operations within the Bounds of a Memory Buffer in W3M

Severity
8.8HIGHNVD
EPSS
1.0%
top 23.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 12
Latest updateMay 17

Description

An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m doesn't properly validate the value of tag attribute, which allows remote attackers to cause a denial of service (heap buffer overflow crash) and possibly execute arbitrary code via a crafted HTML page.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

Debiantats/w3m< 0.5.3-30+3
NVDtats/w3m0.5.3-30

Patches

🔴Vulnerability Details

3
GHSA
GHSA-8qc7-2fj9-qrqv: An issue was discovered in the Tatsuya Kinoshita w3m fork before 02022-05-17
OSV
CVE-2016-9424: An issue was discovered in the Tatsuya Kinoshita w3m fork before 02016-12-12
CVEList
CVE-2016-9424: An issue was discovered in the Tatsuya Kinoshita w3m fork before 02016-12-12

📋Vendor Advisories

3
Ubuntu
w3m vulnerabilities2017-03-02
Red Hat
w3m: Out-of-bounds heap write due to negative array index2016-08-16
Debian
CVE-2016-9424: w3m - An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m d...2016

💬Community

1
Bugzilla
CVE-2016-9424 w3m: Out-of-bounds heap write due to negative array index2016-11-29
CVE-2016-9424 — Tats W3M vulnerability | cvebase