w3m through 0.5.3 does not properly handle temporary files when the ~/.w3m directory is unwritable, which allows a local attacker to craft a symlink attack to overwrite arbitrary files.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://bugs.debian.org/888097 | issue tracking third party advisory patch |
https://usn.ubuntu.com/3555-2/ | third party advisory vendor advisory |
https://usn.ubuntu.com/3555-1/ | third party advisory vendor advisory |
https://github.com/tats/w3m/commit/18dcbadf2771cdb0c18509b14e4e73505b242753 | third party advisory patch |
https://salsa.debian.org/debian/w3m/commit/18dcbadf2771cdb0c18509b14e4e73505b242753 | third party advisory patch |
http://www.securityfocus.com/bid/102855 | vdb entry third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00028.html | vendor advisory |