8.8
CVSSv3

CVE-2016-9426

Published: 12/12/2016 Updated: 29/12/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

An issue exists in the Tatsuya Kinoshita w3m fork prior to 0.5.3-31. Integer overflow vulnerability in the renderTable function in w3m allows remote malicious users to cause a denial of service (OOM) and possibly execute arbitrary code due to bdwgc's bug (CVE-2016-9427) via a crafted HTML page.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tats w3m

Vendor Advisories

Debian Bug report logs - #844726 w3m: CVE-2016-9439: stack overflow Package: src:w3m; Maintainer for src:w3m is Tatsuya Kinoshita <tats@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 18 Nov 2016 13:39:01 UTC Severity: normal Tags: patch, security, upstream Found in version w3m/053-8 ...
Several security issues were fixed in w3m ...
An issue was discovered in the Tatsuya Kinoshita w3m fork before 053-31 Integer overflow vulnerability in the renderTable function in w3m allows remote attackers to cause a denial of service (OOM) and possibly execute arbitrary code due to bdwgc's bug (CVE-2016-9427) via a crafted HTML page ...
A heap corruption vulnerability has been discovered due to an integer overflow in renderTable() leading to an unexpected write outside the tabwidth array boundaries ...