Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-22667

Опубликовано: 05 фев. 2024
Источник: debian
EPSS Низкий

Описание

Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down to the option callback functions.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
vimfixed2:9.0.2189-1package
vimfixed2:9.0.1378-2+deb12u1bookwormpackage
vimno-dsabusterpackage

Примечания

  • https://github.com/vim/vim/commit/b39b240c386a5a29241415541f1c99e2e6b8ce47 (v9.0.2142)

  • https://gist.githubusercontent.com/henices/2467e7f22dcc2aa97a2453e197b55a0c/raw/7b54bccc9a129c604fb139266f4497ab7aaa94c7/gistfile1.txt

EPSS

Процентиль: 34%
0.00135
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 1 года назад

Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down to the option callback functions.

CVSS3: 8.4
redhat
больше 1 года назад

Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down to the option callback functions.

CVSS3: 7.8
nvd
больше 1 года назад

Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down to the option callback functions.

CVSS3: 7.8
msrc
5 месяцев назад

Описание отсутствует

CVSS3: 7.8
redos
около 1 года назад

Уязвимость VIM

EPSS

Процентиль: 34%
0.00135
Низкий