7.5
CVSSv2

CVE-2001-0700

Published: 20/09/2001 Updated: 10/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in w3m 0.2.1 and previous versions allows a remote malicious user to execute arbitrary code via a long base64 encoded MIME header.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

w3m w3m 0.1.8

w3m w3m 0.1.9

w3m w3m 0.1.10

w3m w3m 0.2

w3m w3m

w3m w3m 0.1.3

w3m w3m 0.1.4

w3m w3m 0.1.6

w3m w3m 0.1.7

Vendor Advisories

SecureNet Service reported that w3m (a console web browser) has a buffer overflow in its MIME header parsing code This could be exploited by an attacker if by making a web-server a user visits return carefully crafted MIME headers This has been fixed in version 0110+0111pre+kokb23-4, and we recommend that you upgrade your w3m package ...
In SNS Advisory No 32 a buffer overflow vulnerability has been reported in the routine which parses MIME headers that are returned from web servers A malicious web server administrator could exploit this and let the client web browser execute arbitrary code w3m handles MIME headers included in the request/response message of HTTP communication l ...

Exploits

source: wwwsecurityfocuscom/bid/2895/info W3M is a pager/text-based WWW browser similiar to lynx A buffer overflow vulnerability exists in the 'w3m' client program The overflow occurs when a base64-encoded string exceeding approximately 32 characters in length is received in a MIME header field As a result, it may be possible for a ma ...