Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-1215

Опубликовано: 12 фев. 2025
Источник: redhat
CVSS3: 2.8
EPSS Низкий

Описание

A vulnerability classified as problematic was found in vim up to 9.1.1096. This vulnerability affects unknown code of the file src/main.c. The manipulation of the argument --log leads to memory corruption. It is possible to launch the attack on the local host. Upgrading to version 9.1.1097 is able to address this issue. The patch is identified as c5654b84480822817bb7b69ebc97c174c91185e9. It is recommended to upgrade the affected component.

A flaw was found in Vim. A local user may be able to trigger memory corruption by using the --log option with a non-existent path, which can lead to an application crash or other undefined behavior.

Отчет

This vulnerability is rated Low for Red Hat products. A local attacker must explicitly use the --log option with a non-existent path in vim to trigger memory corruption, leading to an application crash or undefined behavior. This requires user interaction and is not exploitable remotely. Affected products include Red Hat Enterprise Linux, Fedora, and OpenShift Container Platform (via the rhcos component).

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10vimFix deferred
Red Hat Enterprise Linux 6vimOut of support scope
Red Hat Enterprise Linux 7vimOut of support scope
Red Hat Enterprise Linux 8vimOut of support scope
Red Hat Enterprise Linux 9vimFix deferred
Red Hat OpenShift Container Platform 4rhcosFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-119

EPSS

Процентиль: 12%
0.0004
Низкий

2.8 Low

CVSS3

Связанные уязвимости

CVSS3: 2.8
ubuntu
около 1 года назад

A vulnerability classified as problematic was found in vim up to 9.1.1096. This vulnerability affects unknown code of the file src/main.c. The manipulation of the argument --log leads to memory corruption. It is possible to launch the attack on the local host. Upgrading to version 9.1.1097 is able to address this issue. The patch is identified as c5654b84480822817bb7b69ebc97c174c91185e9. It is recommended to upgrade the affected component.

CVSS3: 2.8
nvd
около 1 года назад

A vulnerability classified as problematic was found in vim up to 9.1.1096. This vulnerability affects unknown code of the file src/main.c. The manipulation of the argument --log leads to memory corruption. It is possible to launch the attack on the local host. Upgrading to version 9.1.1097 is able to address this issue. The patch is identified as c5654b84480822817bb7b69ebc97c174c91185e9. It is recommended to upgrade the affected component.

CVSS3: 2.8
msrc
около 1 года назад

vim main.c memory corruption

CVSS3: 2.8
debian
около 1 года назад

A vulnerability classified as problematic was found in vim up to 9.1.1 ...

CVSS3: 2.8
github
около 1 года назад

A vulnerability classified as problematic was found in vim up to 9.1.1096. This vulnerability affects unknown code of the file src/main.c. The manipulation of the argument --log leads to memory corruption. It is possible to launch the attack on the local host. Upgrading to version 9.1.1097 is able to address this issue. The patch is identified as c5654b84480822817bb7b69ebc97c174c91185e9. It is recommended to upgrade the affected component.

EPSS

Процентиль: 12%
0.0004
Низкий

2.8 Low

CVSS3