CVE-2017-6350Integer Overflow or Wraparound in Neovim

Severity
9.8CRITICALNVD
OSV7.8
EPSS
0.7%
top 28.26%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 27
Latest updateMay 14

Description

An integer overflow at an unserialize_uep memory allocation site would occur for vim before patch 8.0.0378, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages5 packages

debiandebian/vim< neovim 0.1.7-4 (bookworm)
debiandebian/neovim< neovim 0.1.7-4 (bookworm)
Debianvim/vim< 2:8.0.0197-3+3
Ubuntuvim/vim< 2:7.4.1689-3ubuntu1.4+2
NVDvim/vim8.0.0377

Patches

🔴Vulnerability Details

3
GHSA
GHSA-h6c7-9rqq-5r2p: An integer overflow at an unserialize_uep memory allocation site would occur for vim before patch 82022-05-14
OSV
vim vulnerabilities2020-03-23
OSV
CVE-2017-6350: An integer overflow at an unserialize_uep memory allocation site would occur for vim before patch 82017-02-27

📋Vendor Advisories

3
Ubuntu
Vim vulnerabilities2020-03-23
Red Hat
vim: Integer overflow at an unserialize_uep memory allocation site2017-02-13
Debian
CVE-2017-6350: neovim - An integer overflow at an unserialize_uep memory allocation site would occur for...2017

💬Community

1
Bugzilla
CVE-2017-6350 vim: Integer overflow at an unserialize_uep memory allocation site2017-03-01