ID CVE-2016-9424 Type cve Reporter cve@mitre.org Modified 2017-07-01T01:30:00
Description
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m doesn't properly validate the value of tag attribute, which allows remote attackers to cause a denial of service (heap buffer overflow crash) and possibly execute arbitrary code via a crafted HTML page.
{"archlinux": [{"lastseen": "2020-09-22T18:36:44", "bulletinFamily": "unix", "cvelist": ["CVE-2016-9422", "CVE-2016-9423", "CVE-2016-9424", "CVE-2016-9425", "CVE-2016-9426", "CVE-2016-9428", "CVE-2016-9429", "CVE-2016-9430", "CVE-2016-9431", "CVE-2016-9432", "CVE-2016-9433", "CVE-2016-9434", "CVE-2016-9435", "CVE-2016-9436", "CVE-2016-9437", "CVE-2016-9438", "CVE-2016-9439", "CVE-2016-9440", "CVE-2016-9441", "CVE-2016-9442"], "description": "Arch Linux Security Advisory ASA-201611-18\n==========================================\n\nSeverity: Critical\nDate : 2016-11-18\nCVE-ID : CVE-2016-9422 CVE-2016-9423 CVE-2016-9424 CVE-2016-9425\nCVE-2016-9426 CVE-2016-9428 CVE-2016-9429 CVE-2016-9430\nCVE-2016-9431 CVE-2016-9432 CVE-2016-9433 CVE-2016-9434\nCVE-2016-9435 CVE-2016-9436 CVE-2016-9437 CVE-2016-9438\nCVE-2016-9439 CVE-2016-9440 CVE-2016-9441 CVE-2016-9442\nPackage : w3m\nType : multiple issues\nRemote : Yes\nLink : https://wiki.archlinux.org/index.php/CVE\n\nSummary\n=======\n\nThe package w3m before version 0.5.3.git20161031-1 is vulnerable to\nmultiple issues including arbitrary code execution and denial of\nservice.\n\nResolution\n==========\n\nUpgrade to 0.5.3.git20161031-1.\n\n# pacman -Syu \"w3m>=0.5.3.git20161031-1\"\n\nThe problems have been fixed upstream in version 0.5.3.git20161031.\n\nWorkaround\n==========\n\nNone.\n\nDescription\n===========\n\n- CVE-2016-9422 (arbitrary code execution)\n\nA problem has been discovered when rowspan and colspan are not at least\n1. If either one of them is zero and the other is larger than 1, HTT_X\nand HTT_Y attributes are not set correctly resulting in a wrong\ncalculation of maxcol or maxrow (not including colspan/rowspan). This\nis leading to a potentially exploitable buffer overflow.\n\n- CVE-2016-9423 (arbitrary code execution)\n\nA stack overflow vulnerability has been discovered in deleteFrameSet()\non specially crafted input like a malformed HTML tag.\n\n- CVE-2016-9424 (arbitrary code execution)\n\nA heap out of bound write has been discovered due to a negative array\nindex for selectnumber and textareanumber.\n\n- CVE-2016-9425 (arbitrary code execution)\n\nA heap buffer overflow vulnerability has been discovered in\naddMultirowsForm() duo to an invalid array access resulting in a write\nto lineBuf[-1].\n\n- CVE-2016-9426 (arbitrary code execution)\n\nA heap corruption vulnerability has been discovered due to an integer\noverflow in renderTable() leading to an unexpected write outside the\ntabwidth array boundaries.\n\n- CVE-2016-9428 (arbitrary code execution)\n\nA heap buffer overflow vulnerability has been discovered in\naddMultirowsForm() duo to an invalid array access resulting in a write\nto lineBuf[-1].\n\n- CVE-2016-9429 (arbitrary code execution)\n\nAn out of bounds write vulnerability has been discovered in\nformUpdateBuffer() duo to invalid length and position checks.\n\n- CVE-2016-9430 (denial of service)\n\nA problem has been discovered resulting in malformed input field type\nproperties leading to an application crash.\n\n- CVE-2016-9431 (arbitrary code execution)\n\nA stack overflow vulnerability has been discovered in deleteFrameSet()\non specially crafted input like a malformed HTML tag.\n\n- CVE-2016-9432 (arbitrary code execution)\n\nA vulnerability has been discovered in formUpdateBuffer() duo to\ninsufficient bounds validation leading to a negative sized bcopy() call\ngetting converted to an unexpectedly large value.\n\n- CVE-2016-9433 (denial of service)\n\nAn out of bounds read access has been discovered in the iso2022 parsing\nwhile calculating the WC_CCS_INDEX leading to an application crash\nresulting in denial of service.\n\n- CVE-2016-9434 (arbitrary code execution)\n\nAn out of bounds write vulnerability has been discovered while handling\nform_int fields. An incorrect form_int fid is not properly checked and\nleads to an out of bounds write in forms[form_id]->next.\n\n- CVE-2016-9435 (arbitrary code execution)\n\nMultiple issues have been discovered related to uninitialized values\nfor <i> and <dd> HTML elements. A missing PUSH_ENV(HTML_DL) call is\nleading to a conditional jump or move depending on an uninitialized\nvalue resulting in a stack overflow vulnerability.\n\n- CVE-2016-9436 (arbitrary code execution)\n\nMultiple issues have been discovered related to uninitialized values\nfor <i> and <dd> HTML elements. A missing null string termination for\nthe tagname variable in parsetagx.c is leading to an out of bounds\naccess.\n\n- CVE-2016-9437 (arbitrary code execution)\n\nAn out of bounds write access has been discovered when using invalid\nbutton element type properties like '<button type=radio>'.\n\n- CVE-2016-9438 (denial of service)\n\nA null pointer dereference problem has been discovered while processing\nthe input_alt tag leading to an application crash.\n\n- CVE-2016-9439 (denial of service)\n\nAn infinite recursion problem has been discovered when processing\nnested table and textarea elements leading to an application crash.\n\n- CVE-2016-9440 (denial of service)\n\nA null pointer dereference problem has been discovered in the\nformUpdateBuffer() function leading to a segmentation fault resulting\nin an application crash.\n\n- CVE-2016-9441 (denial of service)\n\nA null pointer dereference problem has been discovered in the\ndo_refill() function triggered by a malformed table_alt tag leading to\na segmentation fault resulting in an application crash.\n\n- CVE-2016-9442 (denial of service)\n\nA potential heap buffer corruption vulnerability has been discovered\ndue to Strgrow. Note that w3m's allocator (boehmgc) preserves more\nspace than the required size due to bucketing so the heap shouldn't be\ncorrupted in practice.\n\nImpact\n======\n\nA remote attacker is able to execute arbitrary code or crash the\napplication via various vectors.\n\nReferences\n==========\n\nhttp://www.openwall.com/lists/oss-security/2016/11/18/3\nhttps://github.com/tats/w3m/issues/8\nhttps://github.com/tats/w3m/issues/9\nhttps://github.com/tats/w3m/issues/12\nhttps://github.com/tats/w3m/issues/21\nhttps://github.com/tats/w3m/issues/25\nhttps://github.com/tats/w3m/issues/26\nhttps://github.com/tats/w3m/issues/29\nhttps://github.com/tats/w3m/issues/7\nhttps://github.com/tats/w3m/issues/10\nhttps://github.com/tats/w3m/issues/13\nhttps://github.com/tats/w3m/issues/14\nhttps://github.com/tats/w3m/issues/15\nhttps://github.com/tats/w3m/issues/16\nhttps://github.com/tats/w3m/commit/33509cc81ec5f2ba44eb6fd98bd5c1b5873e46bd\nhttps://github.com/tats/w3m/issues/17\nhttps://github.com/tats/w3m/issues/18\nhttps://github.com/tats/w3m/issues/20\nhttps://github.com/tats/w3m/issues/22\nhttps://github.com/tats/w3m/issues/24\nhttps://github.com/tats/w3m/commit/d43527cfa0dbb3ccefec4a6f7b32c1434739aa29\nhttps://access.redhat.com/security/cve/CVE-2016-9422\nhttps://access.redhat.com/security/cve/CVE-2016-9423\nhttps://access.redhat.com/security/cve/CVE-2016-9424\nhttps://access.redhat.com/security/cve/CVE-2016-9425\nhttps://access.redhat.com/security/cve/CVE-2016-9426\nhttps://access.redhat.com/security/cve/CVE-2016-9428\nhttps://access.redhat.com/security/cve/CVE-2016-9429\nhttps://access.redhat.com/security/cve/CVE-2016-9430\nhttps://access.redhat.com/security/cve/CVE-2016-9431\nhttps://access.redhat.com/security/cve/CVE-2016-9432\nhttps://access.redhat.com/security/cve/CVE-2016-9433\nhttps://access.redhat.com/security/cve/CVE-2016-9434\nhttps://access.redhat.com/security/cve/CVE-2016-9435\nhttps://access.redhat.com/security/cve/CVE-2016-9436\nhttps://access.redhat.com/security/cve/CVE-2016-9437\nhttps://access.redhat.com/security/cve/CVE-2016-9438\nhttps://access.redhat.com/security/cve/CVE-2016-9439\nhttps://access.redhat.com/security/cve/CVE-2016-9440\nhttps://access.redhat.com/security/cve/CVE-2016-9441\nhttps://access.redhat.com/security/cve/CVE-2016-9442", "modified": "2016-11-18T00:00:00", "published": "2016-11-18T00:00:00", "id": "ASA-201611-18", "href": "https://security.archlinux.org/ASA-201611-18", "type": "archlinux", "title": "[ASA-201611-18] w3m: multiple issues", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "gentoo": [{"lastseen": "2017-01-01T22:15:35", "bulletinFamily": "unix", "cvelist": ["CVE-2016-9430", "CVE-2016-9428", "CVE-2016-9437", "CVE-2016-9422", "CVE-2016-9426", "CVE-2016-9433", "CVE-2016-9425", "CVE-2016-9429", "CVE-2016-9432", "CVE-2016-9441", "CVE-2016-9440", "CVE-2016-9442", "CVE-2016-9438", "CVE-2016-9431", "CVE-2016-9434", "CVE-2016-9439", "CVE-2016-9436", "CVE-2016-9424", "CVE-2016-9435", "CVE-2016-9443", "CVE-2016-9423"], "edition": 1, "description": "### Background\n\nw3m is a text based WWW browser.\n\n### Description\n\nMultiple vulnerabilities have been discovered in w3m. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could execute arbitrary code with the privileges of the process or cause a Denial of Service condition via a maliciously crafted HTML file. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll w3m users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/w3m-0.5.3-r9\"", "modified": "2017-01-01T00:00:00", "published": "2017-01-01T00:00:00", "href": "https://security.gentoo.org/glsa/201701-08", "id": "GLSA-201701-08", "type": "gentoo", "title": "w3m: Multiple vulnerabilities", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "nessus": [{"lastseen": "2021-01-12T11:05:35", "description": "The remote host is affected by the vulnerability described in GLSA-201701-08\n(w3m: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in w3m. Please review the\n CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could execute arbitrary code with the privileges of\n the process or cause a Denial of Service condition via a maliciously\n crafted HTML file.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 23, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2017-01-03T00:00:00", "title": "GLSA-201701-08 : w3m: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-9430", "CVE-2016-9428", "CVE-2016-9437", "CVE-2016-9422", "CVE-2016-9426", "CVE-2016-9433", "CVE-2016-9425", "CVE-2016-9429", "CVE-2016-9432", "CVE-2016-9441", "CVE-2016-9440", "CVE-2016-9442", "CVE-2016-9438", "CVE-2016-9431", "CVE-2016-9434", "CVE-2016-9439", "CVE-2016-9436", "CVE-2016-9424", "CVE-2016-9435", "CVE-2016-9443", "CVE-2016-9423"], "modified": "2017-01-03T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:w3m"], "id": "GENTOO_GLSA-201701-08.NASL", "href": "https://www.tenable.com/plugins/nessus/96239", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201701-08.\n#\n# The advisory text is Copyright (C) 2001-2017 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(96239);\n script_version(\"3.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-9422\", \"CVE-2016-9423\", \"CVE-2016-9424\", \"CVE-2016-9425\", \"CVE-2016-9426\", \"CVE-2016-9428\", \"CVE-2016-9429\", \"CVE-2016-9430\", \"CVE-2016-9431\", \"CVE-2016-9432\", \"CVE-2016-9433\", \"CVE-2016-9434\", \"CVE-2016-9435\", \"CVE-2016-9436\", \"CVE-2016-9437\", \"CVE-2016-9438\", \"CVE-2016-9439\", \"CVE-2016-9440\", \"CVE-2016-9441\", \"CVE-2016-9442\", \"CVE-2016-9443\");\n script_xref(name:\"GLSA\", value:\"201701-08\");\n\n script_name(english:\"GLSA-201701-08 : w3m: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201701-08\n(w3m: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in w3m. Please review the\n CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could execute arbitrary code with the privileges of\n the process or cause a Denial of Service condition via a maliciously\n crafted HTML file.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201701-08\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All w3m users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/w3m-0.5.3-r9'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:w3m\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/01/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/01/03\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-client/w3m\", unaffected:make_list(\"ge 0.5.3-r9\"), vulnerable:make_list(\"lt 0.5.3-r9\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"w3m\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T14:46:48", "description": "This update for w3m fixes the following issues :\n\n - update to debian git version (bsc#1011293) addressed\n security issues: CVE-2016-9621: w3m:\n global-buffer-overflow write (bsc#1012020)\n CVE-2016-9622: w3m: null deref (bsc#1012021)\n CVE-2016-9623: w3m: null deref (bsc#1012022)\n CVE-2016-9624: w3m: near-null deref (bsc#1012023)\n CVE-2016-9625: w3m: stack overflow (bsc#1012024)\n CVE-2016-9626: w3m: stack overflow (bsc#1012025)\n CVE-2016-9627: w3m: heap overflow read + deref\n (bsc#1012026) CVE-2016-9628: w3m: null deref\n (bsc#1012027) CVE-2016-9629: w3m: null deref\n (bsc#1012028) CVE-2016-9630: w3m: global-buffer-overflow\n read (bsc#1012029) CVE-2016-9631: w3m: null deref\n (bsc#1012030) CVE-2016-9632: w3m: global-buffer-overflow\n read (bsc#1012031) CVE-2016-9633: w3m: OOM (bsc#1012032)\n CVE-2016-9434: w3m: null deref (bsc#1011283)\n CVE-2016-9435: w3m: use uninit value (bsc#1011284)\n CVE-2016-9436: w3m: use uninit value (bsc#1011285)\n CVE-2016-9437: w3m: write to rodata (bsc#1011286)\n CVE-2016-9438: w3m: null deref (bsc#1011287)\n CVE-2016-9439: w3m: stack overflow (bsc#1011288)\n CVE-2016-9440: w3m: near-null deref (bsc#1011289)\n CVE-2016-9441: w3m: near-null deref (bsc#1011290)\n CVE-2016-9442: w3m: potential heap buffer corruption\n (bsc#1011291) CVE-2016-9443: w3m: null deref\n (bsc#1011292)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 26, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2016-12-08T00:00:00", "title": "SUSE SLES11 Security Update : w3m (SUSE-SU-2016:3046-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-9437", "CVE-2016-9422", "CVE-2016-9626", "CVE-2016-9425", "CVE-2016-9627", "CVE-2016-9623", "CVE-2016-9622", "CVE-2016-9628", "CVE-2016-9441", "CVE-2016-9440", "CVE-2016-9630", "CVE-2016-9442", "CVE-2016-9438", "CVE-2016-9434", "CVE-2016-9439", "CVE-2016-9436", "CVE-2016-9632", "CVE-2016-9424", "CVE-2016-9621", "CVE-2016-9625", "CVE-2016-9435", "CVE-2016-9633", "CVE-2016-9631", "CVE-2016-9443", "CVE-2010-2074", "CVE-2016-9423", "CVE-2016-9624", "CVE-2016-9629"], "modified": "2016-12-08T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:w3m", "cpe:/o:novell:suse_linux:11"], "id": "SUSE_SU-2016-3046-1.NASL", "href": "https://www.tenable.com/plugins/nessus/95625", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2016:3046-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(95625);\n script_version(\"3.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2010-2074\", \"CVE-2016-9422\", \"CVE-2016-9423\", \"CVE-2016-9424\", \"CVE-2016-9425\", \"CVE-2016-9434\", \"CVE-2016-9435\", \"CVE-2016-9436\", \"CVE-2016-9437\", \"CVE-2016-9438\", \"CVE-2016-9439\", \"CVE-2016-9440\", \"CVE-2016-9441\", \"CVE-2016-9442\", \"CVE-2016-9443\", \"CVE-2016-9621\", \"CVE-2016-9622\", \"CVE-2016-9623\", \"CVE-2016-9624\", \"CVE-2016-9625\", \"CVE-2016-9626\", \"CVE-2016-9627\", \"CVE-2016-9628\", \"CVE-2016-9629\", \"CVE-2016-9630\", \"CVE-2016-9631\", \"CVE-2016-9632\", \"CVE-2016-9633\");\n script_bugtraq_id(40837);\n\n script_name(english:\"SUSE SLES11 Security Update : w3m (SUSE-SU-2016:3046-1)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for w3m fixes the following issues :\n\n - update to debian git version (bsc#1011293) addressed\n security issues: CVE-2016-9621: w3m:\n global-buffer-overflow write (bsc#1012020)\n CVE-2016-9622: w3m: null deref (bsc#1012021)\n CVE-2016-9623: w3m: null deref (bsc#1012022)\n CVE-2016-9624: w3m: near-null deref (bsc#1012023)\n CVE-2016-9625: w3m: stack overflow (bsc#1012024)\n CVE-2016-9626: w3m: stack overflow (bsc#1012025)\n CVE-2016-9627: w3m: heap overflow read + deref\n (bsc#1012026) CVE-2016-9628: w3m: null deref\n (bsc#1012027) CVE-2016-9629: w3m: null deref\n (bsc#1012028) CVE-2016-9630: w3m: global-buffer-overflow\n read (bsc#1012029) CVE-2016-9631: w3m: null deref\n (bsc#1012030) CVE-2016-9632: w3m: global-buffer-overflow\n read (bsc#1012031) CVE-2016-9633: w3m: OOM (bsc#1012032)\n CVE-2016-9434: w3m: null deref (bsc#1011283)\n CVE-2016-9435: w3m: use uninit value (bsc#1011284)\n CVE-2016-9436: w3m: use uninit value (bsc#1011285)\n CVE-2016-9437: w3m: write to rodata (bsc#1011286)\n CVE-2016-9438: w3m: null deref (bsc#1011287)\n CVE-2016-9439: w3m: stack overflow (bsc#1011288)\n CVE-2016-9440: w3m: near-null deref (bsc#1011289)\n CVE-2016-9441: w3m: near-null deref (bsc#1011290)\n CVE-2016-9442: w3m: potential heap buffer corruption\n (bsc#1011291) CVE-2016-9443: w3m: null deref\n (bsc#1011292)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1011269\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1011270\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1011271\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1011272\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1011283\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1011284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1011285\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1011286\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1011287\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1011288\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1011289\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1011290\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1011291\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1011292\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1011293\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1012020\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1012021\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1012022\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1012023\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1012024\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1012025\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1012026\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1012027\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1012028\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1012029\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1012030\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1012031\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1012032\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2010-2074/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9422/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9423/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9424/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9425/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9434/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9435/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9436/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9437/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9438/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9439/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9440/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9441/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9442/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9443/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9621/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9622/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9623/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9624/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9625/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9626/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9627/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9628/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9629/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9630/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9631/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9632/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-9633/\"\n );\n # https://www.suse.com/support/update/announcement/2016/suse-su-20163046-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fa9dbeff\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server 11-SP4:zypper in -t patch\nslessp4-w3m-12875=1\n\nSUSE Linux Enterprise Debuginfo 11-SP4:zypper in -t patch\ndbgsp4-w3m-12875=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:w3m\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/06/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/12/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/12/08\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES11)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES11\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES11\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES11 SP4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"w3m-0.5.3.git20161120-4.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"w3m\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-01T06:44:41", "description": "A large number of security issues were discovered in the w3m browser.\nIf a user were tricked into viewing a malicious website, a remote\nattacker could exploit a variety of issues related to web browser\nsecurity, including cross-site scripting attacks, denial of service\nattacks, and arbitrary code execution.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 25, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2017-03-03T00:00:00", "title": "Ubuntu 12.04 LTS / 14.04 LTS : w3m vulnerabilities (USN-3214-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-9430", "CVE-2016-9428", "CVE-2016-9437", "CVE-2016-9422", "CVE-2016-9626", "CVE-2016-9426", "CVE-2016-9433", "CVE-2016-9425", "CVE-2016-9429", "CVE-2016-9627", "CVE-2016-9623", "CVE-2016-9622", "CVE-2016-9628", "CVE-2016-9432", "CVE-2016-9441", "CVE-2016-9440", "CVE-2016-9630", "CVE-2016-9442", "CVE-2016-9438", "CVE-2016-9431", "CVE-2016-9434", "CVE-2016-9439", "CVE-2016-9436", "CVE-2016-9632", "CVE-2016-9424", "CVE-2016-9625", "CVE-2016-9435", "CVE-2016-9633", "CVE-2016-9631", "CVE-2016-9443", "CVE-2016-9423", "CVE-2016-9624", "CVE-2016-9629"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:w3m", "cpe:/o:canonical:ubuntu_linux:12.04:-:lts", "cpe:/o:canonical:ubuntu_linux:14.04"], "id": "UBUNTU_USN-3214-1.NASL", "href": "https://www.tenable.com/plugins/nessus/97522", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-3214-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(97522);\n script_version(\"3.5\");\n script_cvs_date(\"Date: 2019/09/18 12:31:46\");\n\n script_cve_id(\"CVE-2016-9422\", \"CVE-2016-9423\", \"CVE-2016-9424\", \"CVE-2016-9425\", \"CVE-2016-9426\", \"CVE-2016-9428\", \"CVE-2016-9429\", \"CVE-2016-9430\", \"CVE-2016-9431\", \"CVE-2016-9432\", \"CVE-2016-9433\", \"CVE-2016-9434\", \"CVE-2016-9435\", \"CVE-2016-9436\", \"CVE-2016-9437\", \"CVE-2016-9438\", \"CVE-2016-9439\", \"CVE-2016-9440\", \"CVE-2016-9441\", \"CVE-2016-9442\", \"CVE-2016-9443\", \"CVE-2016-9622\", \"CVE-2016-9623\", \"CVE-2016-9624\", \"CVE-2016-9625\", \"CVE-2016-9626\", \"CVE-2016-9627\", \"CVE-2016-9628\", \"CVE-2016-9629\", \"CVE-2016-9630\", \"CVE-2016-9631\", \"CVE-2016-9632\", \"CVE-2016-9633\");\n script_xref(name:\"USN\", value:\"3214-1\");\n\n script_name(english:\"Ubuntu 12.04 LTS / 14.04 LTS : w3m vulnerabilities (USN-3214-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A large number of security issues were discovered in the w3m browser.\nIf a user were tricked into viewing a malicious website, a remote\nattacker could exploit a variety of issues related to web browser\nsecurity, including cross-site scripting attacks, denial of service\nattacks, and arbitrary code execution.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/3214-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected w3m package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:w3m\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/12/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/03/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/03/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2017-2019 Canonical, Inc. / NASL script (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(12\\.04|14\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 12.04 / 14.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"12.04\", pkgname:\"w3m\", pkgver:\"0.5.3-5ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"w3m\", pkgver:\"0.5.3-15ubuntu0.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"w3m\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-06T10:59:32", "description": "Multiple remote code execution and denial of service conditions\npresent.", "edition": 26, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2017-01-03T00:00:00", "title": "FreeBSD : w3m -- multiple vulnerabilities (eafa3aec-211b-4dd4-9b8a-a664a3f0917a)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-9430", "CVE-2016-9428", "CVE-2016-9437", "CVE-2016-9422", "CVE-2016-9626", "CVE-2016-9426", "CVE-2016-9433", "CVE-2016-9425", "CVE-2016-9429", "CVE-2016-9627", "CVE-2016-9623", "CVE-2016-9622", "CVE-2016-9628", "CVE-2016-9432", "CVE-2016-9441", "CVE-2016-9440", "CVE-2016-9630", "CVE-2016-9442", "CVE-2016-9438", "CVE-2016-9431", "CVE-2016-9434", "CVE-2016-9439", "CVE-2016-9436", "CVE-2016-9632", "CVE-2016-9424", "CVE-2016-9625", "CVE-2016-9435", "CVE-2016-9633", "CVE-2016-9631", "CVE-2016-9443", "CVE-2016-9423", "CVE-2016-9624", "CVE-2016-9629"], "modified": "2017-01-03T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:ja-w3m-img", "p-cpe:/a:freebsd:freebsd:ja-w3m", "p-cpe:/a:freebsd:freebsd:w3m", "cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:w3m-img"], "id": "FREEBSD_PKG_EAFA3AEC211B4DD49B8AA664A3F0917A.NASL", "href": "https://www.tenable.com/plugins/nessus/96223", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2019 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(96223);\n script_version(\"3.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2016-9422\", \"CVE-2016-9423\", \"CVE-2016-9424\", \"CVE-2016-9425\", \"CVE-2016-9426\", \"CVE-2016-9428\", \"CVE-2016-9429\", \"CVE-2016-9430\", \"CVE-2016-9431\", \"CVE-2016-9432\", \"CVE-2016-9433\", \"CVE-2016-9434\", \"CVE-2016-9435\", \"CVE-2016-9436\", \"CVE-2016-9437\", \"CVE-2016-9438\", \"CVE-2016-9439\", \"CVE-2016-9440\", \"CVE-2016-9441\", \"CVE-2016-9442\", \"CVE-2016-9443\", \"CVE-2016-9622\", \"CVE-2016-9623\", \"CVE-2016-9624\", \"CVE-2016-9625\", \"CVE-2016-9626\", \"CVE-2016-9627\", \"CVE-2016-9628\", \"CVE-2016-9629\", \"CVE-2016-9630\", \"CVE-2016-9631\", \"CVE-2016-9632\", \"CVE-2016-9633\");\n\n script_name(english:\"FreeBSD : w3m -- multiple vulnerabilities (eafa3aec-211b-4dd4-9b8a-a664a3f0917a)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple remote code execution and denial of service conditions\npresent.\"\n );\n # http://seclists.org/oss-sec/2016/q4/452\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://seclists.org/oss-sec/2016/q4/452\"\n );\n # http://seclists.org/oss-sec/2016/q4/516\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://seclists.org/oss-sec/2016/q4/516\"\n );\n # https://vuxml.freebsd.org/freebsd/eafa3aec-211b-4dd4-9b8a-a664a3f0917a.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a83467f8\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ja-w3m\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ja-w3m-img\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:w3m\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:w3m-img\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/11/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/01/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/01/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"w3m<0.5.3.20170102\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"w3m-img<0.5.3.20170102\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ja-w3m<0.5.3.20170102\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ja-w3m-img<0.5.3.20170102\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:11:37", "description": "Security fix for CVE-2016-9422, CVE-2016-9423, CVE-2016-9424,\nCVE-2016-9425, CVE-2016-9428, CVE-2016-9426, CVE-2016-9429,\nCVE-2016-9430, CVE-2016-9431, CVE-2016-9432, CVE-2016-9433,\nCVE-2016-9434, CVE-2016-9435, CVE-2016-9436, CVE-2016-9437,\nCVE-2016-9438, CVE-2016-9439, CVE-2016-9440, CVE-2016-9441,\nCVE-2016-9442, CVE-2016-9443, CVE-2016-9622, CVE-2016-9623,\nCVE-2016-9624, CVE-2016-9625, CVE-2016-9626, CVE-2016-9627,\nCVE-2016-9628, CVE-2016-9629, CVE-2016-9631, CVE-2016-9630,\nCVE-2016-9632, CVE-2016-9633\n\n----\n\nUpdate to latest upstream gitrev 20170102\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 17, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2017-03-22T00:00:00", "title": "Fedora 24 : w3m (2017-783e8fa63e)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-9430", "CVE-2016-9428", "CVE-2016-9437", "CVE-2016-9422", "CVE-2016-9626", "CVE-2016-9426", "CVE-2016-9433", "CVE-2016-9425", "CVE-2016-9429", "CVE-2016-9627", "CVE-2016-9623", "CVE-2016-9622", "CVE-2016-9628", "CVE-2016-9432", "CVE-2016-9441", "CVE-2016-9440", "CVE-2016-9630", "CVE-2016-9442", "CVE-2016-9438", "CVE-2016-9431", "CVE-2016-9434", "CVE-2016-9439", "CVE-2016-9436", "CVE-2016-9632", "CVE-2016-9424", "CVE-2016-9625", "CVE-2016-9435", "CVE-2016-9633", "CVE-2016-9631", "CVE-2016-9443", "CVE-2016-9423", "CVE-2016-9624", "CVE-2016-9629"], "modified": "2017-03-22T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:w3m", "cpe:/o:fedoraproject:fedora:24"], "id": "FEDORA_2017-783E8FA63E.NASL", "href": "https://www.tenable.com/plugins/nessus/97866", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-783e8fa63e.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(97866);\n script_version(\"3.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2016-9422\", \"CVE-2016-9423\", \"CVE-2016-9424\", \"CVE-2016-9425\", \"CVE-2016-9426\", \"CVE-2016-9428\", \"CVE-2016-9429\", \"CVE-2016-9430\", \"CVE-2016-9431\", \"CVE-2016-9432\", \"CVE-2016-9433\", \"CVE-2016-9434\", \"CVE-2016-9435\", \"CVE-2016-9436\", \"CVE-2016-9437\", \"CVE-2016-9438\", \"CVE-2016-9439\", \"CVE-2016-9440\", \"CVE-2016-9441\", \"CVE-2016-9442\", \"CVE-2016-9443\", \"CVE-2016-9622\", \"CVE-2016-9623\", \"CVE-2016-9624\", \"CVE-2016-9625\", \"CVE-2016-9626\", \"CVE-2016-9627\", \"CVE-2016-9628\", \"CVE-2016-9629\", \"CVE-2016-9630\", \"CVE-2016-9631\", \"CVE-2016-9632\", \"CVE-2016-9633\");\n script_xref(name:\"FEDORA\", value:\"2017-783e8fa63e\");\n\n script_name(english:\"Fedora 24 : w3m (2017-783e8fa63e)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Security fix for CVE-2016-9422, CVE-2016-9423, CVE-2016-9424,\nCVE-2016-9425, CVE-2016-9428, CVE-2016-9426, CVE-2016-9429,\nCVE-2016-9430, CVE-2016-9431, CVE-2016-9432, CVE-2016-9433,\nCVE-2016-9434, CVE-2016-9435, CVE-2016-9436, CVE-2016-9437,\nCVE-2016-9438, CVE-2016-9439, CVE-2016-9440, CVE-2016-9441,\nCVE-2016-9442, CVE-2016-9443, CVE-2016-9622, CVE-2016-9623,\nCVE-2016-9624, CVE-2016-9625, CVE-2016-9626, CVE-2016-9627,\nCVE-2016-9628, CVE-2016-9629, CVE-2016-9631, CVE-2016-9630,\nCVE-2016-9632, CVE-2016-9633\n\n----\n\nUpdate to latest upstream gitrev 20170102\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-783e8fa63e\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected w3m package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:w3m\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:24\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/12/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/03/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/03/22\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^24([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 24\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC24\", reference:\"w3m-0.5.3-30.git20170102.fc24\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"w3m\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T10:15:45", "description": "Security fix for CVE-2016-9422, CVE-2016-9423, CVE-2016-9424,\nCVE-2016-9425, CVE-2016-9428, CVE-2016-9426, CVE-2016-9429,\nCVE-2016-9430, CVE-2016-9431, CVE-2016-9432, CVE-2016-9433,\nCVE-2016-9434, CVE-2016-9435, CVE-2016-9436, CVE-2016-9437,\nCVE-2016-9438, CVE-2016-9439, CVE-2016-9440, CVE-2016-9441,\nCVE-2016-9442, CVE-2016-9443, CVE-2016-9622, CVE-2016-9623,\nCVE-2016-9624, CVE-2016-9625, CVE-2016-9626, CVE-2016-9627,\nCVE-2016-9628, CVE-2016-9629, CVE-2016-9631, CVE-2016-9630,\nCVE-2016-9632, CVE-2016-9633\n\nAnd new upstream 20170102 as well\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 17, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2017-03-14T00:00:00", "title": "Fedora 25 : w3m (2017-2e6b693937)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-9430", "CVE-2016-9428", "CVE-2016-9437", "CVE-2016-9422", "CVE-2016-9626", "CVE-2016-9426", "CVE-2016-9433", "CVE-2016-9425", "CVE-2016-9429", "CVE-2016-9627", "CVE-2016-9623", "CVE-2016-9622", "CVE-2016-9628", "CVE-2016-9432", "CVE-2016-9441", "CVE-2016-9440", "CVE-2016-9630", "CVE-2016-9442", "CVE-2016-9438", "CVE-2016-9431", "CVE-2016-9434", "CVE-2016-9439", "CVE-2016-9436", "CVE-2016-9632", "CVE-2016-9424", "CVE-2016-9625", "CVE-2016-9435", "CVE-2016-9633", "CVE-2016-9631", "CVE-2016-9443", "CVE-2016-9423", "CVE-2016-9624", "CVE-2016-9629"], "modified": "2017-03-14T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:w3m", "cpe:/o:fedoraproject:fedora:25"], "id": "FEDORA_2017-2E6B693937.NASL", "href": "https://www.tenable.com/plugins/nessus/97700", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-2e6b693937.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(97700);\n script_version(\"3.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-9422\", \"CVE-2016-9423\", \"CVE-2016-9424\", \"CVE-2016-9425\", \"CVE-2016-9426\", \"CVE-2016-9428\", \"CVE-2016-9429\", \"CVE-2016-9430\", \"CVE-2016-9431\", \"CVE-2016-9432\", \"CVE-2016-9433\", \"CVE-2016-9434\", \"CVE-2016-9435\", \"CVE-2016-9436\", \"CVE-2016-9437\", \"CVE-2016-9438\", \"CVE-2016-9439\", \"CVE-2016-9440\", \"CVE-2016-9441\", \"CVE-2016-9442\", \"CVE-2016-9443\", \"CVE-2016-9622\", \"CVE-2016-9623\", \"CVE-2016-9624\", \"CVE-2016-9625\", \"CVE-2016-9626\", \"CVE-2016-9627\", \"CVE-2016-9628\", \"CVE-2016-9629\", \"CVE-2016-9630\", \"CVE-2016-9631\", \"CVE-2016-9632\", \"CVE-2016-9633\");\n script_xref(name:\"FEDORA\", value:\"2017-2e6b693937\");\n\n script_name(english:\"Fedora 25 : w3m (2017-2e6b693937)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Security fix for CVE-2016-9422, CVE-2016-9423, CVE-2016-9424,\nCVE-2016-9425, CVE-2016-9428, CVE-2016-9426, CVE-2016-9429,\nCVE-2016-9430, CVE-2016-9431, CVE-2016-9432, CVE-2016-9433,\nCVE-2016-9434, CVE-2016-9435, CVE-2016-9436, CVE-2016-9437,\nCVE-2016-9438, CVE-2016-9439, CVE-2016-9440, CVE-2016-9441,\nCVE-2016-9442, CVE-2016-9443, CVE-2016-9622, CVE-2016-9623,\nCVE-2016-9624, CVE-2016-9625, CVE-2016-9626, CVE-2016-9627,\nCVE-2016-9628, CVE-2016-9629, CVE-2016-9631, CVE-2016-9630,\nCVE-2016-9632, CVE-2016-9633\n\nAnd new upstream 20170102 as well\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-2e6b693937\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected w3m package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:w3m\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:25\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/12/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/03/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/03/14\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^25([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 25\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC25\", reference:\"w3m-0.5.3-30.git20170102.fc25\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"w3m\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "fedora": [{"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2016-9422", "CVE-2016-9423", "CVE-2016-9424", "CVE-2016-9425", "CVE-2016-9426", "CVE-2016-9428", "CVE-2016-9429", "CVE-2016-9430", "CVE-2016-9431", "CVE-2016-9432", "CVE-2016-9433", "CVE-2016-9434", "CVE-2016-9435", "CVE-2016-9436", "CVE-2016-9437", "CVE-2016-9438", "CVE-2016-9439", "CVE-2016-9440", "CVE-2016-9441", "CVE-2016-9442", "CVE-2016-9443", "CVE-2016-9622", "CVE-2016-9623", "CVE-2016-9624", "CVE-2016-9625", "CVE-2016-9626", "CVE-2016-9627", "CVE-2016-9628", "CVE-2016-9629", "CVE-2016-9630", "CVE-2016-9631", "CVE-2016-9632", "CVE-2016-9633"], "description": "The w3m program is a pager (or text file viewer) that can also be used as a text-mode Web browser. W3m features include the following: when reading an HTML document, you can follow links and view images using an external image viewer; its internet message mode determines the type of document from the header; if the Content-Type field of the document is text/html, the document is displayed as an HTML document; you can change a URL description like 'http://hogege.net' in plain text into a link to that URL. If you want to display the inline images on w3m, you need to install w3m-img package as well. ", "modified": "2017-03-21T02:50:18", "published": "2017-03-21T02:50:18", "id": "FEDORA:DBAFC600E5CF", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 24 Update: w3m-0.5.3-30.git20170102.fc24", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2016-9422", "CVE-2016-9423", "CVE-2016-9424", "CVE-2016-9425", "CVE-2016-9426", "CVE-2016-9428", "CVE-2016-9429", "CVE-2016-9430", "CVE-2016-9431", "CVE-2016-9432", "CVE-2016-9433", "CVE-2016-9434", "CVE-2016-9435", "CVE-2016-9436", "CVE-2016-9437", "CVE-2016-9438", "CVE-2016-9439", "CVE-2016-9440", "CVE-2016-9441", "CVE-2016-9442", "CVE-2016-9443", "CVE-2016-9622", "CVE-2016-9623", "CVE-2016-9624", "CVE-2016-9625", "CVE-2016-9626", "CVE-2016-9627", "CVE-2016-9628", "CVE-2016-9629", "CVE-2016-9630", "CVE-2016-9631", "CVE-2016-9632", "CVE-2016-9633"], "description": "The w3m program is a pager (or text file viewer) that can also be used as a text-mode Web browser. W3m features include the following: when reading an HTML document, you can follow links and view images using an external image viewer; its internet message mode determines the type of document from the header; if the Content-Type field of the document is text/html, the document is displayed as an HTML document; you can change a URL description like 'http://hogege.net' in plain text into a link to that URL. If you want to display the inline images on w3m, you need to install w3m-img package as well. ", "modified": "2017-03-14T02:23:55", "published": "2017-03-14T02:23:55", "id": "FEDORA:877786070D3D", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 25 Update: w3m-0.5.3-30.git20170102.fc25", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "openvas": [{"lastseen": "2019-05-29T18:34:06", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-9430", "CVE-2016-9428", "CVE-2016-9437", "CVE-2016-9422", "CVE-2016-9626", "CVE-2016-9426", "CVE-2016-9433", "CVE-2016-9425", "CVE-2016-9429", "CVE-2016-9627", "CVE-2016-9623", "CVE-2016-9622", "CVE-2016-9628", "CVE-2016-9432", "CVE-2016-9441", "CVE-2016-9440", "CVE-2016-9630", "CVE-2016-9442", "CVE-2016-9438", "CVE-2016-9431", "CVE-2016-9434", "CVE-2016-9439", "CVE-2016-9436", "CVE-2016-9632", "CVE-2016-9424", "CVE-2016-9625", "CVE-2016-9435", "CVE-2016-9633", "CVE-2016-9631", "CVE-2016-9443", "CVE-2016-9423", "CVE-2016-9624", "CVE-2016-9629"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2017-03-14T00:00:00", "id": "OPENVAS:1361412562310872480", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872480", "type": "openvas", "title": "Fedora Update for w3m FEDORA-2017-2e6b693937", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for w3m FEDORA-2017-2e6b693937\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.872480\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-03-14 05:52:35 +0100 (Tue, 14 Mar 2017)\");\n script_cve_id(\"CVE-2016-9422\", \"CVE-2016-9423\", \"CVE-2016-9424\", \"CVE-2016-9425\",\n \"CVE-2016-9428\", \"CVE-2016-9426\", \"CVE-2016-9429\", \"CVE-2016-9430\",\n \"CVE-2016-9431\", \"CVE-2016-9432\", \"CVE-2016-9433\", \"CVE-2016-9434\",\n \"CVE-2016-9435\", \"CVE-2016-9436\", \"CVE-2016-9437\", \"CVE-2016-9438\",\n \"CVE-2016-9439\", \"CVE-2016-9440\", \"CVE-2016-9441\", \"CVE-2016-9442\",\n \"CVE-2016-9443\", \"CVE-2016-9622\", \"CVE-2016-9623\", \"CVE-2016-9624\",\n \"CVE-2016-9625\", \"CVE-2016-9626\", \"CVE-2016-9627\", \"CVE-2016-9628\",\n \"CVE-2016-9629\", \"CVE-2016-9631\", \"CVE-2016-9630\", \"CVE-2016-9632\",\n \"CVE-2016-9633\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for w3m FEDORA-2017-2e6b693937\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'w3m'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"w3m on Fedora 25\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2017-2e6b693937\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YSOH6NVKCFJP4GSVXHBDWHLEJ24W6HWV\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC25\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC25\")\n{\n\n if ((res = isrpmvuln(pkg:\"w3m\", rpm:\"w3m~0.5.3~30.git20170102.fc25\", rls:\"FC25\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:34:34", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-9430", "CVE-2016-9428", "CVE-2016-9437", "CVE-2016-9422", "CVE-2016-9626", "CVE-2016-9426", "CVE-2016-9433", "CVE-2016-9425", "CVE-2016-9429", "CVE-2016-9627", "CVE-2016-9623", "CVE-2016-9622", "CVE-2016-9628", "CVE-2016-9432", "CVE-2016-9441", "CVE-2016-9440", "CVE-2016-9630", "CVE-2016-9442", "CVE-2016-9438", "CVE-2016-9431", "CVE-2016-9434", "CVE-2016-9439", "CVE-2016-9436", "CVE-2016-9632", "CVE-2016-9424", "CVE-2016-9625", "CVE-2016-9435", "CVE-2016-9633", "CVE-2016-9631", "CVE-2016-9443", "CVE-2016-9423", "CVE-2016-9624", "CVE-2016-9629"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2017-03-03T00:00:00", "id": "OPENVAS:1361412562310843072", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843072", "type": "openvas", "title": "Ubuntu Update for w3m USN-3214-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for w3m USN-3214-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843072\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-03-03 05:50:19 +0100 (Fri, 03 Mar 2017)\");\n script_cve_id(\"CVE-2016-9422\", \"CVE-2016-9423\", \"CVE-2016-9424\", \"CVE-2016-9425\", \"CVE-2016-9426\", \"CVE-2016-9428\", \"CVE-2016-9429\", \"CVE-2016-9430\", \"CVE-2016-9431\", \"CVE-2016-9432\", \"CVE-2016-9433\", \"CVE-2016-9434\", \"CVE-2016-9435\", \"CVE-2016-9436\", \"CVE-2016-9437\", \"CVE-2016-9438\", \"CVE-2016-9439\", \"CVE-2016-9440\", \"CVE-2016-9441\", \"CVE-2016-9442\", \"CVE-2016-9443\", \"CVE-2016-9622\", \"CVE-2016-9623\", \"CVE-2016-9624\", \"CVE-2016-9625\", \"CVE-2016-9626\", \"CVE-2016-9627\", \"CVE-2016-9628\", \"CVE-2016-9629\", \"CVE-2016-9630\", \"CVE-2016-9631\", \"CVE-2016-9632\", \"CVE-2016-9633\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for w3m USN-3214-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'w3m'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"A large number of security issues were discovered in the w3m browser. If a\nuser were tricked into viewing a malicious website, a remote attacker could\nexploit a variety of issues related to web browser security, including\ncross-site scripting attacks, denial of service attacks, and arbitrary code\nexecution.\");\n script_tag(name:\"affected\", value:\"w3m on Ubuntu 14.04 LTS,\n Ubuntu 12.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"3214-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3214-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.04 LTS|12\\.04 LTS)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"w3m\", ver:\"0.5.3-15ubuntu0.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"w3m\", ver:\"0.5.3-5ubuntu1.2\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:34:13", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-9430", "CVE-2016-9428", "CVE-2016-9437", "CVE-2016-9422", "CVE-2016-9626", "CVE-2016-9426", "CVE-2016-9433", "CVE-2016-9425", "CVE-2016-9429", "CVE-2016-9627", "CVE-2016-9623", "CVE-2016-9622", "CVE-2016-9628", "CVE-2016-9432", "CVE-2016-9441", "CVE-2016-9440", "CVE-2016-9630", "CVE-2016-9442", "CVE-2016-9438", "CVE-2016-9431", "CVE-2016-9434", "CVE-2016-9439", "CVE-2016-9436", "CVE-2016-9632", "CVE-2016-9424", "CVE-2016-9625", "CVE-2016-9435", "CVE-2016-9633", "CVE-2016-9631", "CVE-2016-9443", "CVE-2016-9423", "CVE-2016-9624", "CVE-2016-9629"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2017-03-21T00:00:00", "id": "OPENVAS:1361412562310872507", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872507", "type": "openvas", "title": "Fedora Update for w3m FEDORA-2017-783e8fa63e", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for w3m FEDORA-2017-783e8fa63e\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.872507\");\n script_version(\"$Revision: 14225 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 15:32:03 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-03-21 05:56:01 +0100 (Tue, 21 Mar 2017)\");\n script_cve_id(\"CVE-2016-9422\", \"CVE-2016-9423\", \"CVE-2016-9424\", \"CVE-2016-9425\",\n\t\t\"CVE-2016-9428\", \"CVE-2016-9426\", \"CVE-2016-9429\", \"CVE-2016-9430\",\n\t\t\"CVE-2016-9431\", \"CVE-2016-9432\", \"CVE-2016-9433\", \"CVE-2016-9434\",\n\t\t\"CVE-2016-9435\", \"CVE-2016-9436\", \"CVE-2016-9437\", \"CVE-2016-9438\",\n\t\t\"CVE-2016-9439\", \"CVE-2016-9440\", \"CVE-2016-9441\", \"CVE-2016-9442\",\n\t\t\"CVE-2016-9443\", \"CVE-2016-9622\", \"CVE-2016-9623\", \"CVE-2016-9624\",\n\t\t\"CVE-2016-9625\", \"CVE-2016-9626\", \"CVE-2016-9627\", \"CVE-2016-9628\",\n\t\t\"CVE-2016-9629\", \"CVE-2016-9631\", \"CVE-2016-9630\", \"CVE-2016-9632\",\n\t\t\"CVE-2016-9633\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for w3m FEDORA-2017-783e8fa63e\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'w3m'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"w3m on Fedora 24\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2017-783e8fa63e\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPDUQSVEFUS57KVJBROLLBDTK2KJCT4V\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC24\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC24\")\n{\n\n if ((res = isrpmvuln(pkg:\"w3m\", rpm:\"w3m~0.5.3~30.git20170102.fc24\", rls:\"FC24\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "ubuntu": [{"lastseen": "2020-07-02T11:35:37", "bulletinFamily": "unix", "cvelist": ["CVE-2016-9430", "CVE-2016-9428", "CVE-2016-9437", "CVE-2016-9422", "CVE-2016-9626", "CVE-2016-9426", "CVE-2016-9433", "CVE-2016-9425", "CVE-2016-9429", "CVE-2016-9627", "CVE-2016-9623", "CVE-2016-9622", "CVE-2016-9628", "CVE-2016-9432", "CVE-2016-9441", "CVE-2016-9440", "CVE-2016-9630", "CVE-2016-9442", "CVE-2016-9438", "CVE-2016-9431", "CVE-2016-9434", "CVE-2016-9439", "CVE-2016-9436", "CVE-2016-9632", "CVE-2016-9424", "CVE-2016-9625", "CVE-2016-9435", "CVE-2016-9633", "CVE-2016-9631", "CVE-2016-9443", "CVE-2016-9423", "CVE-2016-9624", "CVE-2016-9629"], "description": "A large number of security issues were discovered in the w3m browser. If a \nuser were tricked into viewing a malicious website, a remote attacker could \nexploit a variety of issues related to web browser security, including \ncross-site scripting attacks, denial of service attacks, and arbitrary code \nexecution.", "edition": 5, "modified": "2017-03-02T00:00:00", "published": "2017-03-02T00:00:00", "id": "USN-3214-1", "href": "https://ubuntu.com/security/notices/USN-3214-1", "title": "w3m vulnerabilities", "type": "ubuntu", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "freebsd": [{"lastseen": "2019-05-29T18:32:24", "bulletinFamily": "unix", "cvelist": ["CVE-2016-9430", "CVE-2016-9428", "CVE-2016-9437", "CVE-2016-9422", "CVE-2016-9626", "CVE-2016-9426", "CVE-2016-9433", "CVE-2016-9425", "CVE-2016-9429", "CVE-2016-9627", "CVE-2016-9623", "CVE-2016-9622", "CVE-2016-9628", "CVE-2016-9432", "CVE-2016-9441", "CVE-2016-9440", "CVE-2016-9630", "CVE-2016-9442", "CVE-2016-9438", "CVE-2016-9431", "CVE-2016-9434", "CVE-2016-9439", "CVE-2016-9436", "CVE-2016-9632", "CVE-2016-9424", "CVE-2016-9625", "CVE-2016-9435", "CVE-2016-9633", "CVE-2016-9631", "CVE-2016-9443", "CVE-2016-9423", "CVE-2016-9624", "CVE-2016-9629"], "description": "\nMultiple remote code execution and denial of service conditions present.\n", "edition": 5, "modified": "2017-01-09T00:00:00", "published": "2016-11-03T00:00:00", "id": "EAFA3AEC-211B-4DD4-9B8A-A664A3F0917A", "href": "https://vuxml.freebsd.org/freebsd/eafa3aec-211b-4dd4-9b8a-a664a3f0917a.html", "title": "w3m -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}]}