CVE-2016-9436

parsetagx.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to a <i> tag.
References
Link Resource
https://security.gentoo.org/glsa/201701-08 Third Party Advisory VDB Entry
https://github.com/tats/w3m/issues/16 Issue Tracking Patch Third Party Advisory
https://github.com/tats/w3m/commit/33509cc81ec5f2ba44eb6fd98bd5c1b5873e46bd Issue Tracking Technical Description Patch
http://www.securityfocus.com/bid/94407 Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2016/11/18/3 Mailing List Patch Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*

Information

Published : 2017-01-20 07:59

Updated : 2018-10-30 09:27


NVD link : CVE-2016-9436

Mitre link : CVE-2016-9436


JSON object : View

CWE
CWE-20

Improper Input Validation

Advertisement

dedicated server usa

Products Affected

w3m_project

  • w3m

opensuse_project

  • leap

opensuse

  • leap