CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
57.3%
An out-of-bounds write issue has been discovered in the backspace handling of the checkType() function in etc.c within the W3M application. This vulnerability is triggered by supplying a specially crafted HTML file to the w3m binary. Exploitation of this flaw could lead to application crashes, resulting in a denial of service condition.
Vendor | Product | Version | CPE |
---|---|---|---|
tats | w3m | 0.5.3+git20230121-1 | cpe:2.3:a:tats:w3m:0.5.3\+git20230121-1:*:*:*:*:*:*:* |
tats | w3m | 0.5.3+git20230121-2 | cpe:2.3:a:tats:w3m:0.5.3\+git20230121-2:*:*:*:*:*:*:* |
tats | w3m | 0.5.3+git20230129 | cpe:2.3:a:tats:w3m:0.5.3\+git20230129:*:*:*:*:*:*:* |
fedoraproject | extra_packages_for_enterprise_linux | 8.0 | cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:* |
fedoraproject | fedora | 39 | cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* |
[
{
"product": "w3m",
"vendor": "n/a",
"defaultStatus": "affected"
},
{
"product": "Fedora",
"vendor": "Fedora",
"collectionURL": "https://packages.fedoraproject.org/",
"packageName": "w3m",
"defaultStatus": "affected"
},
{
"product": "Extra Packages for Enterprise Linux",
"vendor": "Fedora",
"collectionURL": "https://packages.fedoraproject.org/",
"packageName": "w3m",
"defaultStatus": "affected"
}
]
bugzilla.redhat.com/show_bug.cgi?id=2255207
github.com/tats/w3m/commit/edc602651c506aeeb60544b55534dd1722a340d3
github.com/tats/w3m/issues/268
github.com/tats/w3m/pull/273
lists.fedoraproject.org/archives/list/[email protected]/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/
lists.fedoraproject.org/archives/list/[email protected]/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/
lists.fedoraproject.org/archives/list/[email protected]/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
57.3%