An exploitable buffer overflow vulnerability exists in the LoadEncoding functionality of the R programming language version 3.3.0. A specially crafted R script can cause a buffer overflow resulting in a memory corruption. An attacker can send a malicious R script to trigger this vulnerability.
References
Link | Resource |
---|---|
http://www.debian.org/security/2017/dsa-3813 | Third Party Advisory |
http://www.securityfocus.com/bid/96785 | Third Party Advisory VDB Entry |
http://www.talosintelligence.com/reports/TALOS-2016-0227/ | Exploit Technical Description Third Party Advisory |
http://www.debian.org/security/2017/dsa-3813 | Third Party Advisory |
http://www.securityfocus.com/bid/96785 | Third Party Advisory VDB Entry |
http://www.talosintelligence.com/reports/TALOS-2016-0227/ | Exploit Technical Description Third Party Advisory |
Configurations
History
21 Nov 2024, 02:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2017/dsa-3813 - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/96785 - Third Party Advisory, VDB Entry | |
References | () http://www.talosintelligence.com/reports/TALOS-2016-0227/ - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2017-03-10 10:59
Updated : 2024-11-21 02:59
NVD link : CVE-2016-8714
Mitre link : CVE-2016-8714
CVE.ORG link : CVE-2016-8714
JSON object : View
Products Affected
r_project
- r
debian
- debian_linux
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')