First published: Mon Feb 27 2017(Updated: )
An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 8.0.0377, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Vim Vim | <=8.0.0376 | |
debian/neovim | 0.4.4-1 0.7.2-7 0.9.5-7 0.9.5-10 | |
debian/vim | 2:8.2.2434-3+deb11u1 2:9.0.1378-2 2:9.1.0709-2 2:9.1.0777-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6349 has a high severity rating due to the potential for buffer overflows resulting from integer overflow vulnerabilities.
To fix CVE-2017-6349, upgrade Vim to version 8.0.0377 or later, or apply the appropriate patches for affected versions.
Versions of Vim before 8.0.0377 are affected by CVE-2017-6349.
Yes, specific versions of Neovim prior to 0.4.4-1 are affected by CVE-2017-6349.
Exploitation of CVE-2017-6349 could lead to arbitrary code execution due to buffer overflows caused by the integer overflow.