CVE-2016-9422

Priority
Low
Description
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31.
The feed_table_tag function in w3m doesn't properly validate the value of
table span, which allows remote attackers to cause a denial of service
(stack and/or heap buffer overflow) and possibly execute arbitrary code via
a crafted HTML page.
References
Bugs
Package
Source: w3m (LP Ubuntu Debian)
Upstream:released (0.5.3-30)
Ubuntu 12.04 LTS (Precise Pangolin):released (0.5.3-5ubuntu1.2)
Ubuntu 14.04 LTS (Trusty Tahr):released (0.5.3-15ubuntu0.1)
Ubuntu Touch 15.04:DNE
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (0.5.3-26ubuntu0.1)
Ubuntu 16.10 (Yakkety Yak):needed
Ubuntu 17.04 (Zesty Zapus):not-affected (0.5.3-30)
Patches:
Debian:https://github.com/tats/w3m/commit/67a3db378f5ee3047c158eae4342f7e3245a2ab1
More Information

Updated: 2017-03-02 16:14:34 UTC (commit 12171)