Описание
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1144.
A heap-based buffer overflow was found in Vim in the msg_puts_printf function in the message.c file. The issue occurs because of an invalid memory access when calculating the length of a string when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the heap-based buffer overflow, causing the application to crash.
Отчет
Red Hat Product Security has rated this issue as having a Low security impact because the user has to run an untrusted file in script mode. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle & Updates Policy: https://access.redhat.com/support/policy/updates/errata/.
Меры по смягчению последствий
Do not run untrusted vim scripts as it is not recommended.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | vim | Out of support scope | ||
Red Hat Enterprise Linux 7 | vim | Out of support scope | ||
Red Hat Enterprise Linux 8 | vim | Not affected | ||
Red Hat Enterprise Linux 9 | vim | Fix deferred |
Показывать по
Дополнительная информация
Статус:
7.8 High
CVSS3
Связанные уязвимости
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1144.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1144.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1 ...
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1144.
7.8 High
CVSS3