Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-25749

Опубликовано: 06 фев. 2026
Источник: redhat
CVSS3: 7.3
EPSS Низкий

Описание

Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.

A flaw was found in Vim, an open source, command line text editor. This heap buffer overflow vulnerability exists in the tag file resolution logic when processing the 'helpfile' option. A local user could exploit this by providing a specially crafted 'helpfile' option value, leading to a heap buffer overflow. This could result in arbitrary code execution or a denial of service.

Отчет

This MODERATE impact vulnerability in Vim's tag file resolution logic allows a local attacker to achieve a out-of-bounds write. By providing a specially crafted helpfile option value a local user can trigger a heap buffer overflow, as consequence lead to memory corruption presenting a data integrity impact or leading the vim process to crash resulting in availability impact. Although being non-trivial and very complex, arbitrary code execution is not discarded as worst case scenario.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6vimOut of support scope
Red Hat Enterprise Linux 7vimAffected
Red Hat Enterprise Linux 9vimAffected
Red Hat OpenShift Container Platform 4rhcosAffected
Red Hat Enterprise Linux 10vimFixedRHSA-2026:471517.03.2026
Red Hat Enterprise Linux 8vimFixedRHSA-2026:444212.03.2026
Red Hat Enterprise Linux 8vimFixedRHSA-2026:444212.03.2026

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-120
https://bugzilla.redhat.com/show_bug.cgi?id=2437843vim: Vim: Arbitrary code execution via 'helpfile' option processing

EPSS

Процентиль: 0%
0.00005
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 6.6
ubuntu
около 2 месяцев назад

Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.

CVSS3: 6.6
nvd
около 2 месяцев назад

Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.

CVSS3: 6.6
debian
около 2 месяцев назад

Vim is an open source, command line text editor. Prior to version 9.1. ...

CVSS3: 6.6
redos
8 дней назад

Уязвимость vim

rocky
14 дней назад

Moderate: vim security update

EPSS

Процентиль: 0%
0.00005
Низкий

7.3 High

CVSS3