[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2006-6772

Date: (C)2006-12-27   (M)2017-07-31
 
CVSS Score: 9.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Format string vulnerability in the inputAnswer function in file.c in w3m before 0.5.2, when run with the dump or backend option, allows remote attackers to execute arbitrary code via format string specifiers in the Common Name (CN) field of an SSL certificate associated with an https URL.

Reference:
SECTRACK-1017440
http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051457.html
BID-21735
SECUNIA-23492
SECUNIA-23588
SECUNIA-23717
SECUNIA-23773
SECUNIA-23792
BID-24332
ADV-2006-5164
FEDORA-2007-077
FEDORA-2007-078
GLSA-200701-06
OpenPKG-SA-2006.44
SUSE-SA:2007:005
USN-399-1
http://sourceforge.net/tracker/index.php?func=detail&aid=1612792&group_id=39518&atid=425439
http://w3m.cvs.sourceforge.net/*checkout*/w3m/w3m/NEWS?revision=1.79
http://w3m.cvs.sourceforge.net/w3m/w3m/file.c?r1=1.249&r2=1.250
http://w3m.cvs.sourceforge.net/w3m/w3m/file.c?view=log
w3m-certificate-format-string(31114)
w3m-inputanswer-format-string(34821)

CWE    1
CWE-134

© 2013 SecPod Technologies