CVE-2017-6349Integer Overflow or Wraparound in Neovim

Severity
9.8CRITICALNVD
OSV7.8
EPSS
0.7%
top 27.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 27
Latest updateMay 14

Description

An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 8.0.0377, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages5 packages

debiandebian/vim< neovim 0.1.7-4 (bookworm)
debiandebian/neovim< neovim 0.1.7-4 (bookworm)
Debianvim/vim< 2:8.0.0197-3+3
Ubuntuvim/vim< 2:7.4.1689-3ubuntu1.4+2
NVDvim/vim8.0.0376

Patches

🔴Vulnerability Details

3
GHSA
GHSA-ppcr-6xhq-q423: An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 82022-05-14
OSV
vim vulnerabilities2020-03-23
OSV
CVE-2017-6349: An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 82017-02-27

📋Vendor Advisories

3
Ubuntu
Vim vulnerabilities2020-03-23
Red Hat
vim: Integer overflow at a u_read_undo memory allocation site2017-02-13
Debian
CVE-2017-6349: neovim - An integer overflow at a u_read_undo memory allocation site would occur for vim ...2017

💬Community

1
Bugzilla
CVE-2017-6349 vim: Integer overflow at a u_read_undo memory allocation site2017-03-01