Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-55157

Опубликовано: 11 авг. 2025
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim’s internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400.

A use-after-free vulnerability was found in Vim. This flaw allows an attacker who can trick a user into processing a specially crafted file to trigger the use-after-free, causing the application to crash.

Отчет

Red Hat Product Security has rated this issue as having a Low security impact because the user has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it. For additional information, refer to the Issue Severity Classification [1] and Red Hat Enterprise Linux Life Cycle & Updates Policy. [1]. https://access.redhat.com/security/updates/classification/ [2]. https://access.redhat.com/support/policy/updates/errata/

Меры по смягчению последствий

Do not run untrusted Vim scripts as it's not recommended.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10vimNot affected
Red Hat Enterprise Linux 6vimNot affected
Red Hat Enterprise Linux 7vimNot affected
Red Hat Enterprise Linux 8vimNot affected
Red Hat Enterprise Linux 9vimNot affected
Red Hat OpenShift Container Platform 4rhcosNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2387859vim: Vim heap use-after-free vulnerability when processing recursive tuple data types

EPSS

Процентиль: 23%
0.00075
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
4 месяца назад

Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim’s internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400.

CVSS3: 8.8
nvd
4 месяца назад

Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim’s internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400.

CVSS3: 8.8
debian
4 месяца назад

Vim is an open source, command line text editor. In versions from 9.1. ...

CVSS3: 8.8
fstec
4 месяца назад

Уязвимость функции tuple_unref() текстового редактора vim, позволяющая нарушителю выполнить произвольный код

suse-cvrf
3 месяца назад

Security update for vim

EPSS

Процентиль: 23%
0.00075
Низкий

6.1 Medium

CVSS3

Уязвимость CVE-2025-55157