Integer Overflow or Wraparound Affecting vim-minimal package, versions *
Snyk CVSS
Attack Complexity
High
User Interaction
Required
Threat Intelligence
EPSS
0.94% (83rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS6-VIMMINIMAL-1987137
- published 26 Jul 2021
- disclosed 13 Feb 2017
Introduced: 13 Feb 2017
CVE-2017-6350 Open this link in a new tabHow to fix?
There is no fixed version for Centos:6
vim-minimal
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-minimal
package and not the vim-minimal
package as distributed by Centos
.
See How to fix?
for Centos:6
relevant fixed versions and status.
An integer overflow at an unserialize_uep memory allocation site would occur for vim before patch 8.0.0378, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.
References
- http://www.securityfocus.com/bid/96448
- https://access.redhat.com/security/cve/CVE-2017-6350
- https://security.gentoo.org/glsa/201706-26
- https://github.com/vim/vim/commit/0c8485f0e4931463c0f7986e1ea84a7d79f10c75
- https://groups.google.com/forum/#!topic/vim_dev/L_dOHOOiQ5Q
- https://groups.google.com/forum/#!topic/vim_dev/QPZc0CY9j3Y
- http://www.securitytracker.com/id/1037949
- https://usn.ubuntu.com/4309-1/
- https://groups.google.com/forum/#%21topic/vim_dev/L_dOHOOiQ5Q
- https://groups.google.com/forum/#%21topic/vim_dev/QPZc0CY9j3Y