PatchSiren cyber security CVE debrief
CVE-2016-9435 Opensuse CVE debrief
CVE-2016-9435 is a medium-severity denial-of-service issue in w3m. The flaw was published on 2017-01-20 and affects versions of w3m before the fixed release noted in the advisory trail. A crafted HTML file can trigger a crash through improper value initialization in HTMLtagproc1 when handling <dd> tags.
- Vendor
- Opensuse
- Product
- CVE-2016-9435
- CVSS
- MEDIUM 6.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-20
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-20
- Advisory updated
- 2026-05-13
Who should care
System administrators, distro maintainers, and users who rely on w3m to render untrusted or externally supplied HTML should care most. Security teams supporting affected openSUSE and w3m deployments should prioritize validation and patching.
Technical summary
NVD describes the issue as a CWE-20 input-validation problem in w3m’s file.c HTMLtagproc1 function. The function does not properly initialize values while processing <dd> tags, and a remote attacker can use a crafted HTML file to crash the application. The CVSS vector indicates no confidentiality or integrity impact, but high availability impact with user interaction required.
Defensive priority
Medium. The issue is remotely triggerable but requires user interaction and results in application crash rather than code execution, so it is primarily an availability concern. Patch quickly if w3m is used to open untrusted HTML content.
Recommended defensive actions
- Upgrade w3m to a fixed release or apply the vendor/backported patch referenced in the advisory trail.
- Confirm downstream packages from your distribution include the fix, especially if you use openSUSE builds.
- Treat untrusted HTML as unsafe input and avoid opening unknown content in w3m until patched.
- Review any automation or scripts that invoke w3m against external content and ensure they run with least privilege.
- Track vendor advisories and security notices for your Linux distribution to confirm remediation status.
Evidence notes
This debrief is based on the official NVD record and the linked advisory/patch references in the source corpus. NVD lists the weakness as CWE-20 and the CVSS v3.0 vector as AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H. Supporting references include the openSUSE update notice, the oss-security patch discussion, the upstream GitHub issue and commit, and the Gentoo GLSA. No exploit details are included here.
Official resources
-
CVE-2016-9435 CVE record
CVE.org
-
CVE-2016-9435 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
Publicly disclosed and cataloged in the official CVE/NVD records on 2017-01-20, with upstream and downstream mitigation references appearing in late 2016 and early 2017.