4.3
CVSSv2

CVE-2016-9435

Published: 20/01/2017 Updated: 29/12/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The HTMLtagproc1 function in file.c in w3m prior to 0.5.3+git20161009 does not properly initialize values, which allows remote malicious users to crash the application via a crafted html file, related to <dd> tags.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

opensuse project leap 42.1

opensuse leap 42.2

tats w3m

Vendor Advisories

Debian Bug report logs - #844726 w3m: CVE-2016-9439: stack overflow Package: src:w3m; Maintainer for src:w3m is Tatsuya Kinoshita &lt;tats@debianorg&gt;; Reported by: Salvatore Bonaccorso &lt;carnil@debianorg&gt; Date: Fri, 18 Nov 2016 13:39:01 UTC Severity: normal Tags: patch, security, upstream Found in version w3m/053-8 ...
Several security issues were fixed in w3m ...
The HTMLtagproc1 function in filec in w3m before 053+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to &lt;dd&gt; tags ...
Multiple issues have been discovered related to uninitialized values for &lt;i&gt; and &lt;dd&gt; HTML elements A missing PUSH_ENV(HTML_DL) call is leading to a conditional jump or move depending on an uninitialized value resulting in a stack overflow vulnerability ...