4.3
CVSSv2

CVE-2016-9437

Published: 12/12/2016 Updated: 29/12/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

An issue exists in the Tatsuya Kinoshita w3m fork prior to 0.5.3-31. w3m allows remote malicious users to cause a denial of service (segmentation fault and crash) and possibly memory corruption via a crafted HTML page.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tats w3m

Vendor Advisories

Debian Bug report logs - #844726 w3m: CVE-2016-9439: stack overflow Package: src:w3m; Maintainer for src:w3m is Tatsuya Kinoshita <tats@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 18 Nov 2016 13:39:01 UTC Severity: normal Tags: patch, security, upstream Found in version w3m/053-8 ...
Several security issues were fixed in w3m ...
An issue was discovered in the Tatsuya Kinoshita w3m fork before 053-31 w3m allows remote attackers to cause a denial of service (segmentation fault and crash) and possibly memory corruption via a crafted HTML page ...
An out of bounds write access has been discovered when using invalid button element type properties like '<button type=radio>' ...