CVE-2016-9424

Priority
Description
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31.
w3m doesn't properly validate the value of tag attribute, which allows
remote attackers to cause a denial of service (heap buffer overflow crash)
and possibly execute arbitrary code via a crafted HTML page.
Package
Source: w3m (LP Ubuntu Debian)
Upstream:released (0.5.3-30)
Ubuntu 12.04 ESM (Precise Pangolin):released (0.5.3-5ubuntu1.2)
Ubuntu 14.04 LTS (Trusty Tahr):released (0.5.3-15ubuntu0.1)
Ubuntu 16.04 LTS (Xenial Xerus):released (0.5.3-26ubuntu0.1)
Patches:
Debian:https://github.com/tats/w3m/commit/a25fd09f74fb83499396935a96d63bb7cb8e2c58
More Information

Updated: 2019-03-19 12:27:42 UTC (commit 15472795df7e9de45b82f2d36b8b419b939f97b2)