8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
10.3%
r-base is vulnerable to Arbitrary Code Execution. The vulnerability is due to deserialization of untrusted data, which can occur when interacting with a maliciously crafted RDS (R Data Serialization) formatted file or R package, allows maliciously crafted RDS (R Data Serialization) formatted files to execute arbitrary code when interacted with in the R statistical programming language.
CPE | Name | Operator | Version |
---|---|---|---|
r-base:sid | eq | 4.0.3-1 | |
r-base:sid | eq | 4.1.1-2 | |
r-base:sid | eq | 4.0.3-1 | |
r-base:sid | eq | 4.1.1-2 |
www.openwall.com/lists/oss-security/2024/04/29/3
hiddenlayer.com/research/r-bitrary-code-execution/
https://kb.cert.org/vuls/id/238194
lists.fedoraproject.org/archives/list/[email protected]/message/7ZLV4OWXZIJ7EFBIWUZADUSHYJTFAQ4D/
lists.fedoraproject.org/archives/list/[email protected]/message/JVE5FDLFJGTAMOSJ6DREFAODEUBRFWSG/
security-tracker.debian.org/tracker/CVE-2024-27322
securityaffairs.com/162591/security/r-programming-language-flaw.html
www.kb.cert.org/vuls/id/238194
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
10.3%