First published: Wed Jan 24 2018(Updated: )
w3m through 0.5.3 does not properly handle temporary files when the ~/.w3m directory is unwritable, which allows a local attacker to craft a symlink attack to overwrite arbitrary files.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
W3m Project W3m | <=0.5.3 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Tats W3m | <=0.5.3 | |
ubuntu/w3m | <0.5.3-34ubuntu0.1 | 0.5.3-34ubuntu0.1 |
ubuntu/w3m | <0.5.3-15ubuntu0.2 | 0.5.3-15ubuntu0.2 |
ubuntu/w3m | <0.5.3-36 | 0.5.3-36 |
ubuntu/w3m | <0.5.3-26ubuntu0.2 | 0.5.3-26ubuntu0.2 |
debian/w3m | 0.5.3+git20210102-6+deb11u1 0.5.3+git20230121-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6198 is a vulnerability in the w3m web browser that allows a local attacker to craft a symlink attack and overwrite arbitrary files when the ~/.w3m directory is unwritable.
CVE-2018-6198 affects w3m versions through 0.5.3.
The severity of CVE-2018-6198 is medium, with a CVSS score of 4.7.
To fix the CVE-2018-6198 vulnerability in w3m, upgrade to version 0.5.3-37 or later.
Yes, you can find references for CVE-2018-6198 at the following links: [Reference 1](http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00028.html), [Reference 2](http://www.securityfocus.com/bid/102855), [Reference 3](https://bugs.debian.org/888097).