First published: Thu Jul 13 2023(Updated: )
An out-of-bounds read flaw was found in w3m, in the Strnew_size function in Str.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tats W3m | =0.5.3\+git20230121 | |
Fedoraproject Extra Packages For Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =38 | |
Redhat Enterprise Linux | =6.0 | |
W3m Project W3m | =0.5.3\+git20230121 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38252 is an out-of-bounds read flaw in w3m in the Strnew_size function in Str.c.
The severity of CVE-2023-38252 is medium.
CVE-2023-38252 affects W3m Project W3m starting from version 0.5.3+git20230121.
An attacker can exploit CVE-2023-38252 by crafting a malicious HTML file to cause a denial of service.
Yes, there are patches available. Please refer to the provided references for more information.