First published: Wed Dec 27 2006(Updated: )
Format string vulnerability in the inputAnswer function in file.c in w3m before 0.5.2, when run with the dump or backend option, allows remote attackers to execute arbitrary code via format string specifiers in the Common Name (CN) field of an SSL certificate associated with an https URL.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
w3m | =0.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6772 has been classified as a critical vulnerability due to its potential for arbitrary code execution.
To mitigate CVE-2006-6772, upgrade w3m to version 0.5.2 or later, where the vulnerability has been addressed.
CVE-2006-6772 affects w3m versions prior to 0.5.2, specifically version 0.5.1.
Yes, CVE-2006-6772 can be exploited remotely through malicious SSL certificates with crafted format string specifiers.
Exploitation of CVE-2006-6772 could allow attackers to execute arbitrary code on the vulnerable system.