First published: Thu Jul 13 2023(Updated: )
w3m 0.5.3+git20230129 has an out-of-bounds read in function Strnew_size in Str.c. This allows attackers to cause a denial of service via a crafted HTML file. Upstream issue: <a href="https://github.com/tats/w3m/issues/270">https://github.com/tats/w3m/issues/270</a>
Affected Software | Affected Version | How to fix |
---|---|---|
w3m |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2222775 is considered high due to its potential for causing a denial of service.
To fix REDHAT-BUG-2222775, you should update the w3m package to the latest version that addresses this vulnerability.
REDHAT-BUG-2222775 is caused by an out-of-bounds read in the Strnew_size function in the w3m code.
The REDHAT-BUG-2222775 vulnerability affects the w3m software, specifically versions prior to the fix.
Yes, REDHAT-BUG-2222775 can be exploited remotely via a crafted HTML file.