Vulnerability Details : CVE-2017-6350
An integer overflow at an unserialize_uep memory allocation site would occur for vim before patch 8.0.0378, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.
Vulnerability category: Overflow
Products affected by CVE-2017-6350
- cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-6350
0.94%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-6350
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2017-6350
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-6350
-
https://usn.ubuntu.com/4309-1/
USN-4309-1: Vim vulnerabilities | Ubuntu security notices
-
http://www.securityfocus.com/bid/96448
Vim CVE-2017-6350 Local Integer Overflow Vulnerability
-
http://www.securitytracker.com/id/1037949
Vim Buffer Overflows in Processing Undo Files Let Local Users Execute Arbitrary Code - SecurityTracker
-
https://security.gentoo.org/glsa/201706-26
Vim, gVim: Remote execution of arbitrary code (GLSA 201706-26) — Gentoo security
-
https://groups.google.com/forum/#!topic/vim_dev/QPZc0CY9j3Y
Integer overflow in src/undo.c:1405 - Google Groepen
-
https://groups.google.com/forum/#!topic/vim_dev/L_dOHOOiQ5Q
Patch 8.0.0378 - Google Groepen
-
https://github.com/vim/vim/commit/0c8485f0e4931463c0f7986e1ea84a7d79f10c75
patch 8.0.0378: possible overflow when reading corrupted undo file · vim/vim@0c8485f · GitHubPatch;Third Party Advisory
Jump to