Impact
The flaw is a local buffer overflow in the Windows GUI Preferences dialog of R i386 3.5.0. By supplying a crafted string in the 'Language for menus and messages' field, a local attacker can overwrite Structured Exception Handler (SEH) records and trigger arbitrary code execution such as launching a calculator or injecting shellcode. This weakness corresponds to CWE‑787, where a program writes beyond the bounds of a buffer.
Affected Systems
The vulnerability affects the R i386 implementation of the R Project, specifically the 3.5.0 release compiled for Windows. No other product versions or vendors are listed in the CNA data for this advisory.
Risk and Exploitability
The CVSS score of 8.6 classifies the defect as high severity. The EPSS score is not provided and the vulnerability is not listed in the CISA KEV catalog, yet a public exploit is available. Exploitation requires local access to the machine and the ability to launch the affected application; if a standard user can run R, code execution is possible, potentially leading to system compromise.
OpenCVE Enrichment