Buffer overflow in w3m 0.2.1 and earlier allows a remote attacker to execute arbitrary code via a long base64 encoded MIME header.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000434 - | |
References | () http://mi.med.tohoku.ac.jp/~satodai/w3m-dev-en/200106.month/537.html - Patch, Vendor Advisory | |
References | () http://www.debian.org/security/2001/dsa-064 - | |
References | () http://www.debian.org/security/2001/dsa-081 - | |
References | () http://www.securityfocus.com/archive/1/192371 - | |
References | () http://www.securityfocus.com/bid/2895 - Exploit, Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/6725 - |
Information
Published : 2001-09-20 04:00
Updated : 2024-11-20 23:35
NVD link : CVE-2001-0700
Mitre link : CVE-2001-0700
CVE.ORG link : CVE-2001-0700
JSON object : View
Products Affected
w3m
- w3m
CWE