Description
An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 8.0.0377, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-850-1 | vim security update |
EUVD |
EUVD-2017-15410 | An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 8.0.0377, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows. |
Ubuntu USN |
USN-4309-1 | Vim vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T15:25:49.193Z
Reserved: 2017-02-26T00:00:00.000Z
Link: CVE-2017-6349
No data.
Status : Modified
Published: 2017-02-27T07:59:00.503
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-6349
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN