CVE-2017-6350
Published: August 31, 2023Last modified: August 31, 2023
Description
An integer overflow at an unserialize_uep memory allocation site would occur for vim before patch 8.0.0378, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack Vector | NETWORK |
Attack complexity | LOW |
Privileges required | NONE |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | HIGH |
Integrity impact | HIGH |
Availability impact | HIGH |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | vim | Not affected (9.0.0999-r0) |
Stream | vim | Not affected (9.0.1676-r0) |
References
- http://www.securityfocus.com/bid/96448
- http://www.securitytracker.com/id/1037949
- https://github.com/vim/vim/commit/0c8485f0e4931463c0f7986e1ea84a7d79f10c75
- https://groups.google.com/forum/#!topic/vim_dev/L_dOHOOiQ5Q
- https://groups.google.com/forum/#!topic/vim_dev/QPZc0CY9j3Y
- https://groups.google.com/forum/#%21topic/vim_dev/L_dOHOOiQ5Q
- https://groups.google.com/forum/#%21topic/vim_dev/QPZc0CY9j3Y
- https://security.gentoo.org/glsa/201706-26
- https://usn.ubuntu.com/4309-1/