Description
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0577.
References (6)
Core 6
Core References
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSSEWQLK55MCNT4Z2IIJEJYEI5HLCODI/
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QI7AETXBHPC7SGA77Q7O5IEGULWYET7/
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202305-16
Patch, Third Party Advisory
https://github.com/vim/vim/commit/96b9bf8f74af8abf1e30054f996708db7dc285be
Exploit, Patch, Third Party Advisory
https://huntr.dev/bounties/958866b8-526a-4979-9471-39392e0c9077
Scores
CVSS v3
7.8
EPSS
0.0007
EPSS Percentile
21.0%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-121
CWE-787
Status
published
Products (4)
fedoraproject/fedora
35
fedoraproject/fedora
36
fedoraproject/fedora
37
vim/vim
< 9.0.0577
Published
Sep 25, 2022
Tracked Since
Feb 18, 2026