Impact
R 3.4.4 on Windows x64 contains a buffer overflow in the GUI Preferences language menu field. The overflow allows a local attacker to craft a payload that bypasses DEP and ASLR protections. By triggering a structured exception handler chain pivot, the attacker can execute arbitrary shellcode with the privileges of the R application. This vulnerability is classified as CWE‑787 (Buffer Overflow).
Affected Systems
The affected product is R‑Project R version 3.4.4 running on Windows 64‑bit systems. No additional sub‑versions or patches are listed; the vulnerability applies to this specific release.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity. The EPSS score of less than 1% suggests a low probability of exploitation in the wild, and the vulnerability is not currently listed in the CISA KEV catalog. Exploitation requires local access to the user account that runs the R application, and the attacker must be able to inject a crafted string via the Language for menus preference. Given the local nature and the need for privileged user interaction, the risk to remote attackers is limited.
OpenCVE Enrichment