Description
An out-of-bounds write issue has been discovered in the backspace handling of the checkType() function in etc.c within the W3M application. This vulnerability is triggered by supplying a specially crafted HTML file to the w3m binary. Exploitation of this flaw could lead to application crashes, resulting in a denial of service condition.
References (7)
Core 7
Core References
Exploit, Issue Tracking, Patch
https://github.com/tats/w3m/issues/268
Issue Tracking, Patch
https://github.com/tats/w3m/pull/273
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/
Issue Tracking, Third Party Advisory issue-tracking
x_refsource_redhat
https://bugzilla.redhat.com/show_bug.cgi?id=2255207
Scores
CVSS v3
5.5
EPSS
0.0002
EPSS Percentile
5.9%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-787
Status
published
Products (5)
fedoraproject/extra_packages_for_enterprise_linux
8.0
fedoraproject/fedora
39
tats/w3m
0.5.3\+git20230121-1
tats/w3m
0.5.3\+git20230121-2
tats/w3m
0.5.3\+git20230129
Published
Dec 21, 2023
Tracked Since
Feb 18, 2026