Vulnerability CVE-2006-6772


Published: 2006-12-27   Modified: 2012-02-12

Description:
Format string vulnerability in the inputAnswer function in file.c in w3m before 0.5.2, when run with the dump or backend option, allows remote attackers to execute arbitrary code via format string specifiers in the Common Name (CN) field of an SSL certificate associated with an https URL.

Type:

CWE-134

(Uncontrolled Format String)

CVSS2 => (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9.3/10
10/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
W3M -> W3M 

 References:
http://fedoranews.org/cms/node/2415
http://fedoranews.org/cms/node/2416
http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051457.html
http://security.gentoo.org/glsa/glsa-200701-06.xml
http://securitytracker.com/id?1017440
http://sourceforge.net/tracker/index.php?func=detail&aid=1612792&group_id=39518&atid=425439
http://w3m.cvs.sourceforge.net/*checkout*/w3m/w3m/NEWS?revision=1.79
http://w3m.cvs.sourceforge.net/w3m/w3m/file.c?r1=1.249&r2=1.250
http://w3m.cvs.sourceforge.net/w3m/w3m/file.c?view=log
http://www.novell.com/linux/security/advisories/2007_05_w3m.html
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.044.html
http://www.securityfocus.com/bid/21735
http://www.securityfocus.com/bid/24332
http://www.ubuntu.com/usn/usn-399-1
http://www.vupen.com/english/advisories/2006/5164
https://exchange.xforce.ibmcloud.com/vulnerabilities/31114
https://exchange.xforce.ibmcloud.com/vulnerabilities/34821

Copyright 2024, cxsecurity.com

 

Back to Top