Stack-based buffer overflow in Vim's map.c
CVE-2024-22667
7.8HIGH
What is CVE-2024-22667?
In Vim versions prior to 9.0.2142, a vulnerability exists related to a stack-based buffer overflow. This issue arises in the function did_set_langmap within the map.c file, where improper handling of the error buffer occurs. Specifically, the sprintf function is used to write data into an error buffer in a way that does not properly ensure sufficient space, leading to potential overflow vulnerabilities. Exploitation of this vulnerability may allow an attacker to execute arbitrary code, posing significant risks to users who rely on this widely-used text editor. It is crucial for users and administrators to update to a patched version to mitigate any associated risks.