Логотип exploitDog
bind:"BDU:2024-07097" OR bind:"CVE-2024-43374"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2024-07097" OR bind:"CVE-2024-43374"

Количество 9

Количество 9

fstec логотип

BDU:2024-07097

10 месяцев назад

Уязвимость функции alist_add() текстового редактора vim, позволяющая нарушителю выполнить произвольные автокоманды

CVSS3: 4.5
EPSS: Низкий
redos логотип

ROS-20241017-09

8 месяцев назад

Множественные уязвимости vim

CVSS3: 5.5
EPSS: Низкий
ubuntu логотип

CVE-2024-43374

10 месяцев назад

The UNIX editor Vim prior to version 9.1.0678 has a use-after-free error in argument list handling. When adding a new file to the argument list, this triggers `Buf*` autocommands. If in such an autocommand the buffer that was just opened is closed (including the window where it is shown), this causes the window structure to be freed which contains a reference to the argument list that we are actually modifying. Once the autocommands are completed, the references to the window and argument list are no longer valid and as such cause an use-after-free. Impact is low since the user must either intentionally add some unusual autocommands that wipe a buffer during creation (either manually or by sourcing a malicious plugin), but it will crash Vim. The issue has been fixed as of Vim patch v9.1.0678.

CVSS3: 4.5
EPSS: Низкий
redhat логотип

CVE-2024-43374

10 месяцев назад

The UNIX editor Vim prior to version 9.1.0678 has a use-after-free error in argument list handling. When adding a new file to the argument list, this triggers `Buf*` autocommands. If in such an autocommand the buffer that was just opened is closed (including the window where it is shown), this causes the window structure to be freed which contains a reference to the argument list that we are actually modifying. Once the autocommands are completed, the references to the window and argument list are no longer valid and as such cause an use-after-free. Impact is low since the user must either intentionally add some unusual autocommands that wipe a buffer during creation (either manually or by sourcing a malicious plugin), but it will crash Vim. The issue has been fixed as of Vim patch v9.1.0678.

CVSS3: 3.3
EPSS: Низкий
nvd логотип

CVE-2024-43374

10 месяцев назад

The UNIX editor Vim prior to version 9.1.0678 has a use-after-free error in argument list handling. When adding a new file to the argument list, this triggers `Buf*` autocommands. If in such an autocommand the buffer that was just opened is closed (including the window where it is shown), this causes the window structure to be freed which contains a reference to the argument list that we are actually modifying. Once the autocommands are completed, the references to the window and argument list are no longer valid and as such cause an use-after-free. Impact is low since the user must either intentionally add some unusual autocommands that wipe a buffer during creation (either manually or by sourcing a malicious plugin), but it will crash Vim. The issue has been fixed as of Vim patch v9.1.0678.

CVSS3: 4.5
EPSS: Низкий
msrc логотип

CVE-2024-43374

10 месяцев назад

CVSS3: 4.5
EPSS: Низкий
debian логотип

CVE-2024-43374

10 месяцев назад

The UNIX editor Vim prior to version 9.1.0678 has a use-after-free err ...

CVSS3: 4.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4409-1

6 месяцев назад

Recommended update for vim

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4330-1

6 месяцев назад

Security update for vim

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2024-07097

Уязвимость функции alist_add() текстового редактора vim, позволяющая нарушителю выполнить произвольные автокоманды

CVSS3: 4.5
0%
Низкий
10 месяцев назад
redos логотип
ROS-20241017-09

Множественные уязвимости vim

CVSS3: 5.5
8 месяцев назад
ubuntu логотип
CVE-2024-43374

The UNIX editor Vim prior to version 9.1.0678 has a use-after-free error in argument list handling. When adding a new file to the argument list, this triggers `Buf*` autocommands. If in such an autocommand the buffer that was just opened is closed (including the window where it is shown), this causes the window structure to be freed which contains a reference to the argument list that we are actually modifying. Once the autocommands are completed, the references to the window and argument list are no longer valid and as such cause an use-after-free. Impact is low since the user must either intentionally add some unusual autocommands that wipe a buffer during creation (either manually or by sourcing a malicious plugin), but it will crash Vim. The issue has been fixed as of Vim patch v9.1.0678.

CVSS3: 4.5
0%
Низкий
10 месяцев назад
redhat логотип
CVE-2024-43374

The UNIX editor Vim prior to version 9.1.0678 has a use-after-free error in argument list handling. When adding a new file to the argument list, this triggers `Buf*` autocommands. If in such an autocommand the buffer that was just opened is closed (including the window where it is shown), this causes the window structure to be freed which contains a reference to the argument list that we are actually modifying. Once the autocommands are completed, the references to the window and argument list are no longer valid and as such cause an use-after-free. Impact is low since the user must either intentionally add some unusual autocommands that wipe a buffer during creation (either manually or by sourcing a malicious plugin), but it will crash Vim. The issue has been fixed as of Vim patch v9.1.0678.

CVSS3: 3.3
0%
Низкий
10 месяцев назад
nvd логотип
CVE-2024-43374

The UNIX editor Vim prior to version 9.1.0678 has a use-after-free error in argument list handling. When adding a new file to the argument list, this triggers `Buf*` autocommands. If in such an autocommand the buffer that was just opened is closed (including the window where it is shown), this causes the window structure to be freed which contains a reference to the argument list that we are actually modifying. Once the autocommands are completed, the references to the window and argument list are no longer valid and as such cause an use-after-free. Impact is low since the user must either intentionally add some unusual autocommands that wipe a buffer during creation (either manually or by sourcing a malicious plugin), but it will crash Vim. The issue has been fixed as of Vim patch v9.1.0678.

CVSS3: 4.5
0%
Низкий
10 месяцев назад
msrc логотип
CVSS3: 4.5
0%
Низкий
10 месяцев назад
debian логотип
CVE-2024-43374

The UNIX editor Vim prior to version 9.1.0678 has a use-after-free err ...

CVSS3: 4.5
0%
Низкий
10 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4409-1

Recommended update for vim

6 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4330-1

Security update for vim

6 месяцев назад

Уязвимостей на страницу