Required CVE Record Information
Description
A vulnerability classified as problematic was found in vim up to 9.1.1096. This vulnerability affects unknown code of the file src/main.c. The manipulation of the argument --log leads to memory corruption. It is possible to launch the attack on the local host. Upgrading to version 9.1.1097 is able to address this issue. The patch is identified as c5654b84480822817bb7b69ebc97c174c91185e9. It is recommended to upgrade the affected component.
CVSS 4 Total
Score | Severity | Version | Vector String |
---|---|---|---|
2.4 | LOW | 4.0 | CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N |
2.8 | LOW | 3.1 | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L |
2.8 | LOW | 3.0 | CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L |
1.7 | — | 2.0 | AV:L/AC:L/Au:S/C:N/I:N/A:P |
Credits
- wenjusun (VulDB User) reporter
References 6 Total
- vuldb.com: VDB-295174 | vim main.c memory corruption vdb-entrytechnical-description
- vuldb.com: VDB-295174 | CTI Indicators (IOB, IOC, IOA) signaturepermissions-required
- vuldb.com: Submit #497546 | VIM vim 68d08588928b29fe0b19e3513cd689486260ab1c illegal read access third-party-advisory
- https://github.com/vim/vim/issues/16606 issue-tracking
- https://github.com/vim/vim/commit/c5654b84480822817bb7b69ebc97c174c91185e9 patch
- https://github.com/vim/vim/releases/tag/v9.1.1097 patch
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.