Use of Externally-Controlled Format String Affecting w3m package, versions <0.5.1-5.1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
21.05% (97th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN8-W3M-395687
  • published27 Dec 2006
  • disclosed27 Dec 2006

Introduced: 27 Dec 2006

CVE-2006-6772  (opens in a new tab)
CWE-134  (opens in a new tab)

How to fix?

Upgrade Debian:8 w3m to version 0.5.1-5.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream w3m package and not the w3m package as distributed by Debian. See How to fix? for Debian:8 relevant fixed versions and status.

Format string vulnerability in the inputAnswer function in file.c in w3m before 0.5.2, when run with the dump or backend option, allows remote attackers to execute arbitrary code via format string specifiers in the Common Name (CN) field of an SSL certificate associated with an https URL.

CVSS Scores

version 3.1