First published: Fri Jan 20 2017(Updated: )
parsetagx.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to a <i> tag.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =42.2 | |
openSUSE Leap | =42.1 | |
w3m | <=0.5.3\+git20160718 | |
w3m | <=0.5.3\+git20160718 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-9436 is typically considered medium due to the potential for application crashes.
To fix CVE-2016-9436, upgrade to w3m version 0.5.3+git20161009 or later.
CVE-2016-9436 affects w3m versions up to and including 0.5.3+git20160718 on specific openSUSE versions.
The impact of CVE-2016-9436 is that it can allow remote attackers to crash the w3m application.
CVE-2016-9436 is not classified as critical, as it primarily leads to application denial of service.