Description
Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down to the option callback functions.
References (8)
Core 8
Core References
Exploit, Third Party Advisory
https://gist.githubusercontent.com/henices/2467e7f22dcc2aa97a2453e197b55a0c/raw/7b54bccc9a129c604fb139266f4497ab7aaa94c7/gistfile1.txt
Third Party Advisory
https://security.netapp.com/advisory/ntap-20240223-0008/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/UI44Y4LJLG34D4HNB6NTPLUPZREHAEL7/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/UIQLVUSYHDN3644K6EFDI7PRZOTIKXM3/
Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UI44Y4LJLG34D4HNB6NTPLUPZREHAEL7/
Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UIQLVUSYHDN3644K6EFDI7PRZOTIKXM3/
Scores
CVSS v3
7.8
EPSS
0.0015
EPSS Percentile
35.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-787
Status
published
Products (3)
fedoraproject/fedora
38
fedoraproject/fedora
39
vim/vim
< 9.0.2142
Published
Feb 05, 2024
Tracked Since
Feb 18, 2026