Lucene search

K
redhatcveRedhat.comRH:CVE-2023-1175
HistoryMar 09, 2023 - 12:15 a.m.

CVE-2023-1175

2023-03-0900:15:04
redhat.com
access.redhat.com
21
vim
buffer size
memory access
virtual editing
denial of service
memory corruption
code execution
mitigation
untrusted scripts

6.6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

0.001 Low

EPSS

Percentile

25.2%

A flaw was found in Vim. There is an incorrect calculation of buffer size issue found in Vim’s yank_copy_line() function of the register.c file. This flaw allows illegal memory access when using virtual editing as “startspaces” goes negative. An attacker can trick a user into opening a specially crafted file, triggering an issue that causes an application to crash leading to a denial of service, corrupting memory, and possibly executing code.

Mitigation

Untrusted vim scripts with -s [scriptin] are not recommended to run.

6.6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

0.001 Low

EPSS

Percentile

25.2%