First published: Mon Dec 12 2016(Updated: )
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Buffer overflow in the formUpdateBuffer function in w3m allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTML page.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
w3m | <=0.5.3-30 | |
w3m | <=0.5.3-30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9429 has a medium severity rating due to its potential to cause denial of service and allow arbitrary code execution.
To fix CVE-2016-9429, upgrade to w3m version 0.5.3-31 or later.
CVE-2016-9429 can be exploited by remote attackers using a crafted HTML page to trigger a buffer overflow.
The potential impact of CVE-2016-9429 includes crashing the application and executing arbitrary code on the affected system.
CVE-2016-9429 affects w3m versions up to and including 0.5.3-30.