First published: Mon Dec 12 2016(Updated: )
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m doesn't properly validate the value of tag attribute, which allows remote attackers to cause a denial of service (heap buffer overflow crash) and possibly execute arbitrary code via a crafted HTML page.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
w3m | <=0.5.3-30 | |
w3m | <=0.5.3-30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9424 is considered a critical vulnerability due to the potential for remote code execution and denial of service.
To fix CVE-2016-9424, upgrade to w3m version 0.5.3-31 or later.
CVE-2016-9424 affects versions of w3m prior to 0.5.3-31, specifically versions up to 0.5.3-30.
CVE-2016-9424 can be exploited by attackers using crafted HTML pages to trigger a heap buffer overflow.
CVE-2016-9424 is associated with the Tatsuya Kinoshita w3m fork and its earlier versions.