Stack-based buffer overflow in Vim's map.c
CVE-2024-22667
What is CVE-2024-22667?
In Vim versions prior to 9.0.2142, a vulnerability exists related to a stack-based buffer overflow. This issue arises in the function did_set_langmap within the map.c file, where improper handling of the error buffer occurs. Specifically, the sprintf function is used to write data into an error buffer in a way that does not properly ensure sufficient space, leading to potential overflow vulnerabilities. Exploitation of this vulnerability may allow an attacker to execute arbitrary code, posing significant risks to users who rely on this widely-used text editor. It is crucial for users and administrators to update to a patched version to mitigate any associated risks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
