[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80170

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2006-6772

Date: (C)2006-12-27   (M)2017-07-31 


Format string vulnerability in the inputAnswer function in file.c in w3m before 0.5.2, when run with the dump or backend option, allows remote attackers to execute arbitrary code via format string specifiers in the Common Name (CN) field of an SSL certificate associated with an https URL.

CVSS Score: 9.3Access Vector: NETWORK
Exploit Score: 8.6Access Complexity: MEDIUM
Impact Score: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE





Reference:
SECTRACK-1017440
http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051457.html
BID-21735
SECUNIA-23492
SECUNIA-23588
SECUNIA-23717
SECUNIA-23773
SECUNIA-23792
BID-24332
ADV-2006-5164
FEDORA-2007-077
FEDORA-2007-078
GLSA-200701-06
OpenPKG-SA-2006.44
SUSE-SA:2007:005
USN-399-1
http://sourceforge.net/tracker/index.php?func=detail&aid=1612792&group_id=39518&atid=425439
http://w3m.cvs.sourceforge.net/*checkout*/w3m/w3m/NEWS?revision=1.79
http://w3m.cvs.sourceforge.net/w3m/w3m/file.c?r1=1.249&r2=1.250
http://w3m.cvs.sourceforge.net/w3m/w3m/file.c?view=log
w3m-certificate-format-string(31114)
w3m-inputanswer-format-string(34821)

CWE    1
CWE-134

© 2013 SecPod Technologies