CVE-2016-9424

An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m doesn't properly validate the value of tag attribute, which allows remote attackers to cause a denial of service (heap buffer overflow crash) and possibly execute arbitrary code via a crafted HTML page.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 66%
VendorProductVersion
tatsw3m
𝑥
≤ 0.5.3-30
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
w3m
bullseye
0.5.3+git20210102-6+deb11u1
fixed
wheezy
no-dsa
sid
0.5.3+git20230121-2
fixed
trixie
0.5.3+git20230121-2
fixed
bookworm
0.5.3+git20230121-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
w3m
zesty
not-affected
yakkety
ignored
xenial
Fixed 0.5.3-26ubuntu0.1
released
trusty
Fixed 0.5.3-15ubuntu0.1
released
precise
Fixed 0.5.3-5ubuntu1.2
released