Description
A vulnerability classified as problematic was found in vim up to 9.1.1096. This vulnerability affects unknown code of the file src/main.c. The manipulation of the argument --log leads to memory corruption. It is possible to launch the attack on the local host. Upgrading to version 9.1.1097 is able to address this issue. The patch is identified as c5654b84480822817bb7b69ebc97c174c91185e9. It is recommended to upgrade the affected component.
References (7)
Core 7
Core References
Third Party Advisory
https://security.netapp.com/advisory/ntap-20250321-0005/
Third Party Advisory, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.295174
Permissions Required, VDB Entry signature
permissions-required
https://vuldb.com/?ctiid.295174
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.497546
Exploit, Issue Tracking issue-tracking
https://github.com/vim/vim/issues/16606
Release Notes patch
https://github.com/vim/vim/releases/tag/v9.1.1097
Scores
CVSS v3
2.8
EPSS
0.0004
EPSS Percentile
12.0%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-119
Status
published
Products (2)
netapp/bootstrap_os
vim/vim
< 9.1.1097
Published
Feb 12, 2025
Tracked Since
Feb 18, 2026