Lucene search

K
mageiaGentoo FoundationMGASA-2024-0105
HistoryApr 01, 2024 - 10:50 p.m.

Updated w3m packages fix security vulnerabilities

2024-04-0122:50:27
Gentoo Foundation
advisories.mageia.org
16
w3m packages
security vulnerabilities
denial of service
out-of-bounds read
out-of-bounds write
html file
application crashes
unix

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

6.6 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

25.6%

An out-of-bounds read flaw was found in w3m, in the Strnew_size function in Str.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file. (CVE-2023-38252) An out-of-bounds read flaw was found in w3m, in the growbuf_to_Str function in indep.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file. (CVE-2023-38253) An out-of-bounds write issue has been discovered in the backspace handling of the checkType() function in etc.c within the W3M application. This vulnerability is triggered by supplying a specially crafted HTML file to the w3m binary. Exploitation of this flaw could lead to application crashes, resulting in a denial of service condition. (CVE-2023-4255)

OSVersionArchitecturePackageVersionFilename
Mageia9noarchw3m< 0.5.3-13.git20230121.1w3m-0.5.3-13.git20230121.1.mga9

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

6.6 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

25.6%