Description
R i386 3.5.0 contains a local buffer overflow vulnerability in the GUI Preferences dialog that allows local attackers to trigger a structured exception handler (SEH) overwrite by supplying malicious input. Attackers can craft a payload string in the 'Language for menus and messages' field to overwrite SEH records and achieve code execution with calculator or arbitrary shellcode.
Problem types
Product status
Credits
Dino Covotsos - Telspace Systems
References
www.exploit-db.com/exploits/46288 (ExploitDB-46288)
www.r-project.org/ (Official Product Homepage)
cran.r-project.org/...windows/base/old/3.5.0/R-3.5.0-win.exe (Product Reference)
www.vulncheck.com/...sories/r-i386-local-buffer-overflow-seh (VulnCheck Advisory: R i386 3.5.0 Local Buffer Overflow SEH)