CVE-2024-22667

Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down to the option callback functions.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*

History

23 Feb 2024, 16:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240223-0008/ -

15 Feb 2024, 03:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UI44Y4LJLG34D4HNB6NTPLUPZREHAEL7/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UIQLVUSYHDN3644K6EFDI7PRZOTIKXM3/ -

14 Feb 2024, 19:49

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*
References () https://github.com/vim/vim/commit/b39b240c386a5a29241415541f1c99e2e6b8ce47 - () https://github.com/vim/vim/commit/b39b240c386a5a29241415541f1c99e2e6b8ce47 - Patch
References () https://gist.githubusercontent.com/henices/2467e7f22dcc2aa97a2453e197b55a0c/raw/7b54bccc9a129c604fb139266f4497ab7aaa94c7/gistfile1.txt - () https://gist.githubusercontent.com/henices/2467e7f22dcc2aa97a2453e197b55a0c/raw/7b54bccc9a129c604fb139266f4497ab7aaa94c7/gistfile1.txt - Exploit, Third Party Advisory
First Time Vim vim
Vim
CWE CWE-787

05 Feb 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-05 08:15

Updated : 2024-02-28 20:54


NVD link : CVE-2024-22667

Mitre link : CVE-2024-22667

CVE.ORG link : CVE-2024-22667


JSON object : View

Products Affected

vim

  • vim
CWE
CWE-787

Out-of-bounds Write