Lucene search

K
redhatcveRedhat.comRH:CVE-2023-1175
HistoryMar 09, 2023 - 12:15 a.m.

CVE-2023-1175

2023-03-0900:15:04
redhat.com
access.redhat.com
24
vim
buffer size
memory access
virtual editing
denial of service
memory corruption
code execution
mitigation
untrusted scripts

CVSS3

6.6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

EPSS

0.001

Percentile

31.1%

A flaw was found in Vim. There is an incorrect calculation of buffer size issue found in Vim’s yank_copy_line() function of the register.c file. This flaw allows illegal memory access when using virtual editing as “startspaces” goes negative. An attacker can trick a user into opening a specially crafted file, triggering an issue that causes an application to crash leading to a denial of service, corrupting memory, and possibly executing code.

Mitigation

Untrusted vim scripts with -s [scriptin] are not recommended to run.

CVSS3

6.6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

EPSS

0.001

Percentile

31.1%