Description
Augeas versions up to and including 1.8.0 are vulnerable to heap-based buffer overflow due to improper handling of escaped strings. Attacker could send crafted strings that would cause the application using augeas to copy past the end of a buffer, leading to a crash or possible code execution.
References (6)
Core 6
Core References
Various Sources x_refsource_confirm
https://puppet.com/security/cve/cve-2017-7555
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/100378
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:2788
Third Party Advisory x_refsource_misc
https://github.com/hercules-team/augeas/pull/480
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2017/dsa-3949
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:2403
Scores
CVSS v3
9.8
EPSS
0.0124
EPSS Percentile
79.3%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-119
CWE-122
Status
published
Products (2)
augeas/augeas
< 1.8.0
Red Hat, Inc./augeas
up to and including 1.8.0
Published
Aug 17, 2017
Tracked Since
Feb 18, 2026