CVE-2016-9630Improper Restriction of Operations within the Bounds of a Memory Buffer in W3M

Severity
6.5MEDIUMNVD
EPSS
1.1%
top 21.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 12
Latest updateMay 17

Description

An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (global buffer overflow and crash) via a crafted HTML page.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

Debiantats/w3m< 0.5.3-33+3
NVDtats/w3m0.5.3-32

Patches

🔴Vulnerability Details

3
GHSA
GHSA-g7qf-5www-5qrv: An issue was discovered in the Tatsuya Kinoshita w3m fork before 02022-05-17
OSV
CVE-2016-9630: An issue was discovered in the Tatsuya Kinoshita w3m fork before 02016-12-12
CVEList
CVE-2016-9630: An issue was discovered in the Tatsuya Kinoshita w3m fork before 02016-12-12

📋Vendor Advisories

3
Ubuntu
w3m vulnerabilities2017-03-02
Red Hat
w3m: Buffer-overflow in parseURL()2016-11-17
Debian
CVE-2016-9630: w3m - An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m a...2016

💬Community

1
Bugzilla
CVE-2016-9630 w3m: Buffer-overflow in parseURL()2016-11-29
CVE-2016-9630 — Tats W3M vulnerability | cvebase