Upstream information

CVE-2022-38223 at MITRE

Description

There is an out-of-bounds write in checkType located in etc.c in w3m 0.5.3. It can be triggered by sending a crafted HTML file to the w3m binary. It allows an attacker to cause Denial of Service or possibly have unspecified other impact.

SUSE information

Overall state of this security issue: Pending

This issue is currently rated as having moderate severity.

CVSS v3 Scores
  National Vulnerability Database SUSE
Base Score 7.8 5.5
Vector CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Attack Vector Local Local
Attack Complexity Low Low
Privileges Required None None
User Interaction Required Required
Scope Unchanged Unchanged
Confidentiality Impact High None
Integrity Impact High None
Availability Impact High High
CVSSv3 Version 3.1 3.1
SUSE Bugzilla entry: 1202684 [NEW]

No SUSE Security Announcements cross referenced.


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
HPE Helion OpenStack 8 w3m Affected
SUSE Linux Enterprise Desktop 12 w3m Affected
SUSE Linux Enterprise Desktop 12 SP1 w3m Affected
SUSE Linux Enterprise Desktop 12 SP2 w3m Affected
SUSE Linux Enterprise Desktop 12 SP3 w3m Affected
SUSE Linux Enterprise Desktop 12 SP4 w3m Affected
SUSE Linux Enterprise High Performance Computing 12 SP5 w3m Affected
SUSE Linux Enterprise Server 11 SP3 w3m Affected
SUSE Linux Enterprise Server 11 SP3-LTSS w3m Affected
SUSE Linux Enterprise Server 11 SP4 w3m Affected
SUSE Linux Enterprise Server 11 SP4-LTSS w3m Affected
SUSE Linux Enterprise Server 12 w3m Affected
SUSE Linux Enterprise Server 12 SP1 w3m Affected
SUSE Linux Enterprise Server 12 SP1-LTSS w3m Affected
SUSE Linux Enterprise Server 12 SP2 w3m Affected
SUSE Linux Enterprise Server 12 SP2-BCL w3m Affected
SUSE Linux Enterprise Server 12 SP2-ESPOS w3m Affected
SUSE Linux Enterprise Server 12 SP2-LTSS w3m Affected
SUSE Linux Enterprise Server 12 SP3 w3m Affected
SUSE Linux Enterprise Server 12 SP3-BCL w3m Affected
SUSE Linux Enterprise Server 12 SP3-ESPOS w3m Affected
SUSE Linux Enterprise Server 12 SP3-LTSS w3m Affected
SUSE Linux Enterprise Server 12 SP4 w3m Affected
SUSE Linux Enterprise Server 12 SP4-ESPOS w3m Affected
SUSE Linux Enterprise Server 12 SP4-LTSS w3m Affected
SUSE Linux Enterprise Server 12 SP5 w3m Affected
SUSE Linux Enterprise Server 12-LTSS w3m Affected
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 w3m Affected
SUSE Linux Enterprise Server for SAP Applications 12 SP1 w3m Affected
SUSE Linux Enterprise Server for SAP Applications 12 SP2 w3m Affected
SUSE Linux Enterprise Server for SAP Applications 12 SP3 w3m Affected
SUSE Linux Enterprise Server for SAP Applications 12 SP4 w3m Affected
SUSE Linux Enterprise Server for SAP Applications 12 SP5 w3m Affected
SUSE OpenStack Cloud 7 w3m Affected
SUSE OpenStack Cloud 8 w3m Affected
SUSE OpenStack Cloud 9 w3m Affected
SUSE OpenStack Cloud Crowbar 8 w3m Affected
SUSE OpenStack Cloud Crowbar 9 w3m Affected


SUSE Timeline for this CVE

CVE page created: Mon Aug 15 18:00:19 2022
CVE page last modified: Tue Nov 29 16:29:19 2022