Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-6349

Опубликовано: 27 фев. 2017
Источник: debian
EPSS Низкий

Описание

An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 8.0.0377, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
vimfixed2:8.0.0197-3package
vimfixed2:7.4.488-7+deb8u3jessiepackage
neovimfixed0.1.7-4package

Примечания

  • Fixed by: https://github.com/vim/vim/commit/3eb1637b1bba19519885dd6d377bd5596e91d22c

EPSS

Процентиль: 73%
0.0077
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 9 лет назад

An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 8.0.0377, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.

CVSS3: 2.5
redhat
почти 9 лет назад

An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 8.0.0377, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.

CVSS3: 9.8
nvd
почти 9 лет назад

An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 8.0.0377, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.

CVSS3: 9.8
github
больше 3 лет назад

An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 8.0.0377, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.

suse-cvrf
больше 8 лет назад

Security update for vim

EPSS

Процентиль: 73%
0.0077
Низкий