Multiple vulnerabilities in w3m



Published: 2023-11-18
Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2023-38253
CVE-2023-38252
CWE-ID CWE-125
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
w3m
Server applications / Web servers

Vendor w3m.sourceforge.net

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Out-of-bounds read

EUVDB-ID: #VU83259

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-38253

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to crash the application.

The vulnerability exists due to a boundary condition within the growbuf_to_Str() function in indep.c. A remote attacker can create a specially crafted HTML file, trick the victim into opening it, trigger an out-of-bounds read error and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

w3m: 0.5 - 0.5.3+git20230121

CPE2.3 External links

http://access.redhat.com/security/cve/CVE-2023-38253
http://github.com/tats/w3m/issues/271
http://bugzilla.redhat.com/show_bug.cgi?id=2222779


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Out-of-bounds read

EUVDB-ID: #VU83258

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-38252

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to crash the application.

The vulnerability exists due to a boundary condition within the Strnew_size() function in Str.c. A remote attacker can create a specially crafted HTML file, trick the victim into opening it, trigger an out-of-bounds read error and crash the application.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

w3m: 0.5 - 0.5.3+git20230121

CPE2.3 External links

http://github.com/tats/w3m/issues/270
http://access.redhat.com/security/cve/CVE-2023-38252
http://bugzilla.redhat.com/show_bug.cgi?id=2222775


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###