First published: Tue Dec 19 2023(Updated: )
w3m has an out-of-bounds write in function checkType() in etc.c. It allows a local attacker to cause Denial of Service or possibly have unspecified other impact via a crafted HTML file. NOTE: It was introduced in the fix of <a href="https://access.redhat.com/security/cve/CVE-2022-38223">CVE-2022-38223</a>. Affects: w3m 0.5.3+git20230129, 0.5.3+git20230121-1, 0.5.3+git20230121-2 Not Affected version: < 0.5.3+git20220429-1 <a href="https://github.com/tats/w3m/issues/268">https://github.com/tats/w3m/issues/268</a> <a href="https://github.com/tats/w3m/pull/273">https://github.com/tats/w3m/pull/273</a>
Affected Software | Affected Version | How to fix |
---|---|---|
w3m | >=0.5.3+git20230129>=0.5.3+git20230121-1>=0.5.3+git20230121-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2255207 is considered high due to the potential for Denial of Service and other unspecified impacts.
To fix REDHAT-BUG-2255207, update w3m to a version that addresses the out-of-bounds write vulnerability.
Versions of w3m starting from 0.5.3+git20230121 up to the latest prior to the fix are affected by REDHAT-BUG-2255207.
No, REDHAT-BUG-2255207 is a local vulnerability that requires local access to the system.
REDHAT-BUG-2255207 can lead to Denial of Service and may allow for other unspecified impacts depending on the exploit.