Description
Vim is an open source, command line text editor. A segmentation fault was found in Vim before 9.1.1043. In silent Ex mode (-s -e), Vim typically doesn't show a screen and just operates silently in batch mode. However, it is still possible to trigger the function that handles the scrolling of a gui version of Vim by feeding some binary characters to Vim. The function that handles the scrolling however may be triggering a redraw, which will access the ScreenLines pointer, even so this variable hasn't been allocated (since there is no screen). This vulnerability is fixed in 9.1.1043.
References (5)
Core 5
Core References
Third Party Advisory
https://security.netapp.com/advisory/ntap-20250314-0005/
Vendor Advisory x_refsource_confirm
https://github.com/vim/vim/security/advisories/GHSA-j3g9-wg22-v955
Patch x_refsource_misc
https://github.com/vim/vim/commit/9d1bed5eccdbb46a26b8a484f5e9163c40e63919
Scores
CVSS v3
4.2
EPSS
0.0010
EPSS Percentile
28.0%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-787
Status
published
Products (2)
netapp/hci_compute_node_firmware
vim/vim
< 9.1.1043
Published
Jan 20, 2025
Tracked Since
Feb 18, 2026