Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-4141

Опубликовано: 25 нояб. 2022
Источник: debian

Описание

Heap based buffer overflow in vim/vim 9.0.0946 and below by allowing an attacker to CTRL-W gf in the expression used in the RHS of the substitute command.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
vimfixed2:9.0.1000-1package

Примечания

  • https://huntr.dev/bounties/20ece512-c600-45ac-8a84-d0931e05541f

  • https://github.com/vim/vim/commit/cc762a48d42b579fb7bdec2c614636b830342dd5 (v9.0.0947)

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 3 лет назад

Heap based buffer overflow in vim/vim 9.0.0946 and below by allowing an attacker to CTRL-W gf in the expression used in the RHS of the substitute command.

CVSS3: 7.8
redhat
около 3 лет назад

Heap based buffer overflow in vim/vim 9.0.0946 and below by allowing an attacker to CTRL-W gf in the expression used in the RHS of the substitute command.

CVSS3: 7.8
nvd
около 3 лет назад

Heap based buffer overflow in vim/vim 9.0.0946 and below by allowing an attacker to CTRL-W gf in the expression used in the RHS of the substitute command.

CVSS3: 7.8
msrc
около 3 лет назад

Heap-based Buffer Overflow in vim/vim

CVSS3: 7.8
github
около 3 лет назад

The target's backtrace indicates that libc has detected a heap error or that the target was executing a heap function when it stopped. This could be due to heap corruption, passing a bad pointer to a heap function such as free(), etc. Since heap errors might include buffer overflows, use-after-free situations, etc. they are generally considered exploitable.