First published: Thu Jul 13 2023(Updated: )
w3m 0.5.3+git20230129 has an out-of-bounds read in function growbuf_to_Str in indep.c. This allows attackers to cause a denial of service via a crafted HTML file. Upstream issue: <a href="https://github.com/tats/w3m/issues/271">https://github.com/tats/w3m/issues/271</a>
Affected Software | Affected Version | How to fix |
---|---|---|
w3m |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2222779 is categorized as a potential denial of service vulnerability.
To fix REDHAT-BUG-2222779, it is recommended to update w3m to the latest patched version.
The affected software for REDHAT-BUG-2222779 is w3m version 0.5.3+git20230129.
Yes, REDHAT-BUG-2222779 can be exploited remotely through a crafted HTML file.
REDHAT-BUG-2222779 is an out-of-bounds read vulnerability.