parsetagx.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to a <i> tag.
https://security.gentoo.org/glsa/201701-08
https://github.com/tats/w3m/issues/16
http://www.securityfocus.com/bid/94407
http://www.openwall.com/lists/oss-security/2016/11/18/3
http://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html
https://github.com/tats/w3m/commit/33509cc81ec5f2ba44eb6fd98bd5c1b5873e46bd
Source: Mitre, NVD
Published: 2017-01-20
Updated: 2025-04-20
Base Score: 4.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P
Severity: Medium
Base Score: 6.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
EPSS: 0.00456