Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Vim: Heap Buffer Overflow in spell file loading
Vulnerability Description
Vim is an open source, command line text editor. Prior to version 9.2.0450, a heap buffer overflow exists in read_compound() in src/spellfile.c when loading a crafted spell file (.spl) with UTF-8 encoding active. An attacker-controlled length field in the spell file's compound section overflows a 32-bit signed integer multiplication, causing a small buffer to be allocated for a write loop that runs many iterations, overflowing the heap. Because the 'spelllang' option can be set from a modeline, a text file modeline can trigger spell file loading if a malicious .spl file has been planted on the runtimepath. This issue has been patched in version 9.2.0450.
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
Vulnerability Type
堆缓冲区溢出
Vulnerability Title
Vim 安全漏洞
Vulnerability Description
Vim是Vim开源的一款跨平台的文本编辑器。 Vim 9.2.0450之前版本存在安全漏洞,该漏洞源于read_compound()中的堆缓冲区溢出,可能导致攻击者利用特制拼写文件溢出堆。
CVSS Information
N/A
Vulnerability Type
N/A