parsetagx.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to a <i> tag.
References
Link | Resource |
---|---|
https://security.gentoo.org/glsa/201701-08 | Third Party Advisory VDB Entry |
https://github.com/tats/w3m/issues/16 | Issue Tracking Patch Third Party Advisory |
https://github.com/tats/w3m/commit/33509cc81ec5f2ba44eb6fd98bd5c1b5873e46bd | Issue Tracking Technical Description Patch |
http://www.securityfocus.com/bid/94407 | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2016/11/18/3 | Mailing List Patch Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html | Third Party Advisory |
Information
Published : 2017-01-20 07:59
Updated : 2018-10-30 09:27
NVD link : CVE-2016-9436
Mitre link : CVE-2016-9436
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
w3m_project
- w3m
opensuse_project
- leap
opensuse
- leap