An out-of-bounds write issue has been discovered in the backspace handling of the checkType() function in etc.c within the W3M application. This vulnerability is triggered by supplying a specially crafted HTML file to the w3m binary. Exploitation of this flaw could lead to application crashes, resulting in a denial of service condition.
References
| Link | Resource |
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=2255207 | Issue Tracking Third Party Advisory |
| https://github.com/tats/w3m/commit/edc602651c506aeeb60544b55534dd1722a340d3 | Patch |
| https://github.com/tats/w3m/issues/268 | Exploit Issue Tracking Patch |
| https://github.com/tats/w3m/pull/273 | Issue Tracking Patch |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2023-12-21 16:15
Updated : 2024-01-03 02:30
NVD link : CVE-2023-4255
Mitre link : CVE-2023-4255
JSON object : View
Products Affected
fedoraproject
- extra_packages_for_enterprise_linux
- fedora
tats
- w3m
CWE
CWE-787
Out-of-bounds Write
