CVE-2016-9435

The HTMLtagproc1 function in file.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to <dd> tags.
References
Link Resource
http://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/11/18/3 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/94407 Third Party Advisory VDB Entry
https://github.com/tats/w3m/commit/33509cc81ec5f2ba44eb6fd98bd5c1b5873e46bd Issue Tracking Patch Third Party Advisory
https://github.com/tats/w3m/issues/16 Issue Tracking Patch Third Party Advisory
https://security.gentoo.org/glsa/201701-08 Third Party Advisory VDB Entry
http://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/11/18/3 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/94407 Third Party Advisory VDB Entry
https://github.com/tats/w3m/commit/33509cc81ec5f2ba44eb6fd98bd5c1b5873e46bd Issue Tracking Patch Third Party Advisory
https://github.com/tats/w3m/issues/16 Issue Tracking Patch Third Party Advisory
https://security.gentoo.org/glsa/201701-08 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:01

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html - Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/11/18/3 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/11/18/3 - Mailing List, Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/94407 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/94407 - Third Party Advisory, VDB Entry
References () https://github.com/tats/w3m/commit/33509cc81ec5f2ba44eb6fd98bd5c1b5873e46bd - Issue Tracking, Patch, Third Party Advisory () https://github.com/tats/w3m/commit/33509cc81ec5f2ba44eb6fd98bd5c1b5873e46bd - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/tats/w3m/issues/16 - Issue Tracking, Patch, Third Party Advisory () https://github.com/tats/w3m/issues/16 - Issue Tracking, Patch, Third Party Advisory
References () https://security.gentoo.org/glsa/201701-08 - Third Party Advisory, VDB Entry () https://security.gentoo.org/glsa/201701-08 - Third Party Advisory, VDB Entry

29 Dec 2023, 18:38

Type Values Removed Values Added
First Time Tats
Tats w3m
CPE cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:* cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*

Information

Published : 2017-01-20 15:59

Updated : 2024-11-21 03:01


NVD link : CVE-2016-9435

Mitre link : CVE-2016-9435

CVE.ORG link : CVE-2016-9435


JSON object : View

Products Affected

tats

  • w3m

opensuse_project

  • leap

opensuse

  • leap
CWE
CWE-20

Improper Input Validation