Lucene search

K
redosRedosROS-20240827-10
HistoryAug 27, 2024 - 12:00 a.m.

ROS-20240827-10

2024-08-2700:00:00
redos.red-soft.ru
3
vulnerability
vim text editor
crashes
information security
unix

CVSS3

5.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

AI Score

6.5

Confidence

Low

A vulnerability in the File Name Handler component of the vim text editor exists due to a bug in the use of pointers after memory release in the dialog_changed() function.
pointers after memory release in dialog_changed() function. Exploitation of the vulnerability could allow an
an attacker to cause a pointer usage error after memory freeing and cause the editor to crash

A vulnerability in the tagstack_clear_entry() function of the src/alloc.c file of the vim text editor exists due to a
a bug in using pointers after memory freeing. Exploitation of the vulnerability could allow
an attacker to affect confidentiality, integrity and availability of protected information

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64vim-x11< 9.1.660-1UNKNOWN

CVSS3

5.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

AI Score

6.5

Confidence

Low