CVE-2017-7555

CRITICAL

Augeas <=1.8.0 - Buffer Overflow

Title source: llm
STIX 2.1

Description

Augeas versions up to and including 1.8.0 are vulnerable to heap-based buffer overflow due to improper handling of escaped strings. Attacker could send crafted strings that would cause the application using augeas to copy past the end of a buffer, leading to a crash or possible code execution.

References (6)

Core 6
Core References
Various Sources x_refsource_confirm
https://puppet.com/security/cve/cve-2017-7555
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/100378
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:2788
Third Party Advisory x_refsource_misc
https://github.com/hercules-team/augeas/pull/480
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2017/dsa-3949
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:2403

Scores

CVSS v3 9.8
EPSS 0.0124
EPSS Percentile 79.3%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-119 CWE-122
Status published
Products (2)
augeas/augeas < 1.8.0
Red Hat, Inc./augeas up to and including 1.8.0
Published Aug 17, 2017
Tracked Since Feb 18, 2026