CVE-2023-4255

Source
https://cve.org/CVERecord?id=CVE-2023-4255
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-4255.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-4255
Downstream
Related
Published
2023-12-21T16:15:10.017Z
Modified
2026-03-13T11:35:47.020844Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An out-of-bounds write issue has been discovered in the backspace handling of the checkType() function in etc.c within the W3M application. This vulnerability is triggered by supplying a specially crafted HTML file to the w3m binary. Exploitation of this flaw could lead to application crashes, resulting in a denial of service condition.

References

Affected packages

Git / github.com/tats/w3m

Affected ranges

Type
GIT
Repo
https://github.com/tats/w3m
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "0.5.3+git20230121-1"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "0.5.3+git20230121-2"
        }
    ]
}

Affected versions

debian/0.*
debian/0.1.10+0.1.11pre+kokb23-4
debian/0.3-2.4
debian/0.5.1-1
debian/0.5.1-3
debian/0.5.1-4
debian/0.5.1-5
debian/0.5.1-5.1
debian/0.5.2-1
debian/0.5.2-10
debian/0.5.2-2
debian/0.5.2-2.1
debian/0.5.2-3
debian/0.5.2-4
debian/0.5.2-5
debian/0.5.2-6
debian/0.5.2-7
debian/0.5.2-8
debian/0.5.2-9
debian/0.5.3+git20210102-1
debian/0.5.3+git20210102-2
debian/0.5.3+git20210102-3
debian/0.5.3+git20210102-4
debian/0.5.3+git20210102-5
debian/0.5.3+git20210102-6
debian/0.5.3+git20220429-1
debian/0.5.3+git20230121-1
debian/0.5.3-1
debian/0.5.3-10
debian/0.5.3-11
debian/0.5.3-12
debian/0.5.3-13
debian/0.5.3-14
debian/0.5.3-15
debian/0.5.3-16
debian/0.5.3-17
debian/0.5.3-18
debian/0.5.3-19
debian/0.5.3-2
debian/0.5.3-20
debian/0.5.3-21
debian/0.5.3-22
debian/0.5.3-23
debian/0.5.3-24
debian/0.5.3-25
debian/0.5.3-26
debian/0.5.3-27
debian/0.5.3-28
debian/0.5.3-29
debian/0.5.3-3
debian/0.5.3-30
debian/0.5.3-31
debian/0.5.3-32
debian/0.5.3-33
debian/0.5.3-34
debian/0.5.3-34.1
debian/0.5.3-35
debian/0.5.3-36
debian/0.5.3-37
debian/0.5.3-38
debian/0.5.3-4
debian/0.5.3-5
debian/0.5.3-6
debian/0.5.3-7
debian/0.5.3-8
debian/0.5.3-9
Other
inu-0-2-2-base
release-0-2-1-inu-1-5
release-0-2-2
release-0-2-3
release-0-2-3-1
release-0-2-3-2
release-0-2-4
release-0-2-5
release-0-3
release-0-3-1
release-0-3-2
release-0-3-2-rc1
release-0-3-2-rc2
release-0-3-2-rc3
release-0-3-2-rc4
release-0-4
release-0-4-1
release-0-4-2
release-0-4-rc1
release-0-4-rc2
release-0-4-rc3
release-0-5
release-0-5-1
release-0-5-2
release-0-5-3
upstream/0.*
upstream/0.1.10+0.1.11pre+kokb23
upstream/0.3
upstream/0.5.1
upstream/0.5.2
upstream/0.5.3
upstream/0.5.3+git20210102
upstream/0.5.3+git20220429
upstream/0.5.3+git20230121

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "0.5.3+git20230129"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "8.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "39"
            }
        ]
    }
]
vanir_signatures
[
    {
        "signature_type": "Function",
        "deprecated": false,
        "id": "CVE-2023-4255-6dcfb28a",
        "target": {
            "file": "etc.c",
            "function": "checkType"
        },
        "digest": {
            "length": 5123.0,
            "function_hash": "295724129922167229010520669919116639190"
        },
        "signature_version": "v1",
        "source": "https://github.com/tats/w3m/commit/edc602651c506aeeb60544b55534dd1722a340d3"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "id": "CVE-2023-4255-dab19ff2",
        "target": {
            "file": "etc.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "26460203148569538143327425248504244236",
                "57830455825382049290991589887607861603",
                "310247818144009291104860925577274623094",
                "13455033645732134721802913651060951318",
                "26460203148569538143327425248504244236",
                "290663834867585646756821739283586001902",
                "126908091885490007136439083806724560939",
                "288785725841290717425727131037118380981"
            ]
        },
        "signature_version": "v1",
        "source": "https://github.com/tats/w3m/commit/edc602651c506aeeb60544b55534dd1722a340d3"
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-4255.json"