CVE-2006-6772

Source
https://nvd.nist.gov/vuln/detail/CVE-2006-6772
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2006-6772.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2006-6772
Related
Published
2006-12-27T23:28:00Z
Modified
2024-11-21T00:23:37Z
Summary
[none]
Details

Format string vulnerability in the inputAnswer function in file.c in w3m before 0.5.2, when run with the dump or backend option, allows remote attackers to execute arbitrary code via format string specifiers in the Common Name (CN) field of an SSL certificate associated with an https URL.

References

Affected packages

Debian:11 / w3m

Package

Name
w3m
Purl
pkg:deb/debian/w3m?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.1-5.1

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / w3m

Package

Name
w3m
Purl
pkg:deb/debian/w3m?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.1-5.1

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / w3m

Package

Name
w3m
Purl
pkg:deb/debian/w3m?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.1-5.1

Ecosystem specific

{
    "urgency": "low"
}