An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. The feedtabletag function in w3m doesn't properly validate the value of table span, which allows remote attackers to cause a denial of service (stack and/or heap buffer overflow) and possibly execute arbitrary code via a crafted HTML page.
{ "binaries": [ { "binary_name": "w3m", "binary_version": "0.5.3-15ubuntu0.1" }, { "binary_name": "w3m-dbgsym", "binary_version": "0.5.3-15ubuntu0.1" }, { "binary_name": "w3m-img", "binary_version": "0.5.3-15ubuntu0.1" }, { "binary_name": "w3m-img-dbgsym", "binary_version": "0.5.3-15ubuntu0.1" } ], "ubuntu_priority": "low", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "w3m", "binary_version": "0.5.3-26ubuntu0.1" }, { "binary_name": "w3m-dbgsym", "binary_version": "0.5.3-26ubuntu0.1" }, { "binary_name": "w3m-img", "binary_version": "0.5.3-26ubuntu0.1" }, { "binary_name": "w3m-img-dbgsym", "binary_version": "0.5.3-26ubuntu0.1" } ], "ubuntu_priority": "low", "availability": "No subscription required" }