CVE-2019-25485

6.2 MEDIUM

📋 TL;DR

This CVE describes a buffer overflow vulnerability in R 3.4.4 on Windows x64 systems that allows local attackers to bypass DEP and ASLR protections. By injecting crafted payloads through the Language for menus preference field, attackers can execute arbitrary shellcode with application privileges. Only users running the specific vulnerable version on Windows x64 are affected.

💻 Affected Systems

Products:
  • R
Versions: 3.4.4
Operating Systems: Windows x64
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows x64 builds of R 3.4.4. Other versions and platforms are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full control of the R application process, potentially leading to privilege escalation, data theft, or installation of persistent malware on the system.

🟠

Likely Case

Local user with malicious intent executes arbitrary code within the R application context, potentially accessing sensitive data processed by R or using the application as a foothold for further attacks.

🟢

If Mitigated

With proper access controls and limited user privileges, impact is contained to the user's own session and data, preventing system-wide compromise.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring access to the GUI preferences menu, not exploitable remotely.
🏢 Internal Only: MEDIUM - While requiring local access, this could be exploited by malicious insiders or through malware that gains local execution on vulnerable systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires local access to modify GUI preferences and knowledge of structured exception handler manipulation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R 3.5.0 and later

Vendor Advisory: https://cran.r-project.org/bin/windows/base/old/3.4.4/

Restart Required: Yes

Instructions:

1. Download and install R version 3.5.0 or later from https://cran.r-project.org. 2. Uninstall the vulnerable R 3.4.4 version. 3. Restart the system to ensure all R processes are terminated.

🔧 Temporary Workarounds

Restrict GUI Access

windows

Prevent users from accessing R GUI preferences menu through group policies or application restrictions

Use Command Line Only

windows

Configure R to run in command-line mode only, bypassing the vulnerable GUI component

R.exe --no-save --no-restore --no-site-file --no-init-file

🧯 If You Can't Patch

  • Implement strict access controls to limit who can run R applications on Windows systems
  • Monitor for unusual R process behavior or attempts to modify R configuration files

🔍 How to Verify

Check if Vulnerable:

Check R version by running 'R --version' in command prompt. If output shows 'R version 3.4.4' and you're on Windows x64, you're vulnerable.

Check Version:

R --version

Verify Fix Applied:

After upgrading, run 'R --version' to confirm version is 3.5.0 or higher. Test that the Language preference menu functions normally without crashes.

📡 Detection & Monitoring

Log Indicators:

  • Multiple R process crashes
  • Unusual modifications to R preferences files
  • Attempts to write to R installation directory

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName="Rgui.exe" AND Version="3.4.4"

🔗 References

📤 Share & Export