An out-of-bounds write issue has been discovered in the backspace handling of the checkType() function in etc.c within the W3M application. This vulnerability is triggered by supplying a specially crafted HTML file to the w3m binary. Exploitation of this flaw could lead to application crashes, resulting in a denial of service condition.
[
{
"source": "https://github.com/tats/w3m/commit/edc602651c506aeeb60544b55534dd1722a340d3",
"target": {
"function": "checkType",
"file": "etc.c"
},
"signature_type": "Function",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2023-4255-6dcfb28a",
"digest": {
"length": 5123.0,
"function_hash": "295724129922167229010520669919116639190"
}
},
{
"source": "https://github.com/tats/w3m/commit/edc602651c506aeeb60544b55534dd1722a340d3",
"target": {
"file": "etc.c"
},
"signature_type": "Line",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2023-4255-dab19ff2",
"digest": {
"threshold": 0.9,
"line_hashes": [
"26460203148569538143327425248504244236",
"57830455825382049290991589887607861603",
"310247818144009291104860925577274623094",
"13455033645732134721802913651060951318",
"26460203148569538143327425248504244236",
"290663834867585646756821739283586001902",
"126908091885490007136439083806724560939",
"288785725841290717425727131037118380981"
]
}
}
]