An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://github.com/tats/w3m/issues/28 | issue tracking patch |
https://security.gentoo.org/glsa/201701-08 | vendor advisory |
https://github.com/tats/w3m/blob/master/ChangeLog | issue tracking patch |
http://www.securityfocus.com/bid/94407 | vdb entry |
http://www.openwall.com/lists/oss-security/2016/11/18/3 | third party advisory mailing list |