Stack-based buffer overflow in Vim's map.c
CVE-2024-22667

7.8HIGH

Key Information:

Vendor

Vim

Status
Vendor
CVE Published:
5 February 2024

What is CVE-2024-22667?

In Vim versions prior to 9.0.2142, a vulnerability exists related to a stack-based buffer overflow. This issue arises in the function did_set_langmap within the map.c file, where improper handling of the error buffer occurs. Specifically, the sprintf function is used to write data into an error buffer in a way that does not properly ensure sufficient space, leading to potential overflow vulnerabilities. Exploitation of this vulnerability may allow an attacker to execute arbitrary code, posing significant risks to users who rely on this widely-used text editor. It is crucial for users and administrators to update to a patched version to mitigate any associated risks.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2024-22667 : Stack-based buffer overflow in Vim's map.c