Lucene search

K
gentooGentoo FoundationGLSA-200701-06
HistoryJan 12, 2007 - 12:00 a.m.

w3m: Format string vulnerability

2007-01-1200:00:00
Gentoo Foundation
security.gentoo.org
15

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.127 Low

EPSS

Percentile

95.5%

Background

w3m is a multi-platform text-based web browser.

Description

w3m in -dump or -backend mode does not correctly handle printf() format string specifiers in the Common Name (CN) field of an X.509 SSL certificate.

Impact

An attacker could entice a user to visit a malicious website that would load a specially crafted X.509 SSL certificate containing “%n” or other format string specifiers, possibly resulting in the execution of arbitrary code with the rights of the user running w3m.

Workaround

There is no known workaround at this time.

Resolution

All w3m users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-client/w3m-0.5.1-r4"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-client/w3m< 0.5.1-r4UNKNOWN

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.127 Low

EPSS

Percentile

95.5%