Deserialization of untrusted data can occur in the R statistical programming language, on any version starting at 1.4.0 up to and not including 4.4.0, enabling a maliciously crafted RDS (R Data Serialization) formatted file or R package to run arbitrary code on an end user’s system when interacted with.
History

Thu, 13 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared R Project
R Project r
CPEs cpe:2.3:a:r_project:r:1.4.0:*:*:*:*:*:*:*
Vendors & Products R Project
R Project r
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 13 Feb 2025 18:00:00 +0000

Type Values Removed Values Added
Description Deserialization of untrusted data can occur in the R statistical programming language, on any version starting at 1.4.0 up to and not including 4.4.0, enabling a maliciously crafted RDS (R Data Serialization) formatted file or R package to run arbitrary code on an end user’s system when interacted with. Deserialization of untrusted data can occur in the R statistical programming language, on any version starting at 1.4.0 up to and not including 4.4.0, enabling a maliciously crafted RDS (R Data Serialization) formatted file or R package to run arbitrary code on an end user’s system when interacted with.

cve-icon MITRE

Status: PUBLISHED

Assigner: HiddenLayer

Published:

Updated: 2025-02-13T17:46:26.987Z

Reserved: 2024-02-23T16:59:23.011Z

Link: CVE-2024-27322

cve-icon Vulnrichment

Updated: 2024-08-02T00:34:50.976Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-29T13:15:30.413

Modified: 2025-02-13T18:17:30.000

Link: CVE-2024-27322

cve-icon Redhat

No data.