An out-of-bounds read flaw was found in w3m, in the Strnew_size function in Str.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2023-38252 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2222775 | Issue Tracking Third Party Advisory |
https://github.com/tats/w3m/issues/270 | Exploit Issue Tracking Third Party Advisory |
https://access.redhat.com/security/cve/CVE-2023-38252 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2222775 | Issue Tracking Third Party Advisory |
https://github.com/tats/w3m/issues/270 | Exploit Issue Tracking Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/ | |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/ | |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/ |
Configurations
History
No history.
Information
Published : 2023-07-14 18:15
Updated : 2025-02-08 04:15
NVD link : CVE-2023-38252
Mitre link : CVE-2023-38252
CVE.ORG link : CVE-2023-38252
JSON object : View
Products Affected
redhat
- enterprise_linux
fedoraproject
- extra_packages_for_enterprise_linux
- fedora
tats
- w3m
CWE
CWE-125
Out-of-bounds Read