8.8
CVSSv3

CVE-2016-9423

Published: 12/12/2016 Updated: 29/12/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

An issue exists in the Tatsuya Kinoshita w3m fork prior to 0.5.3-31. Heap-based buffer overflow in w3m allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTML page.

Vulnerable Product Search on Vulmon Subscribe to Product

tats w3m

Vendor Advisories

Debian Bug report logs - #844726 w3m: CVE-2016-9439: stack overflow Package: src:w3m; Maintainer for src:w3m is Tatsuya Kinoshita <tats@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 18 Nov 2016 13:39:01 UTC Severity: normal Tags: patch, security, upstream Found in version w3m/053-8 ...
Several security issues were fixed in w3m ...
An issue was discovered in the Tatsuya Kinoshita w3m fork before 053-31 Heap-based buffer overflow in w3m allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTML page ...
A stack overflow vulnerability has been discovered in deleteFrameSet() on specially crafted input like a malformed HTML tag ...