Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee | third party advisory exploit |
https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd | third party advisory patch |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/ | vendor advisory |
https://security.gentoo.org/glsa/202208-32 | third party advisory vendor advisory |
https://support.apple.com/kb/HT213488 | third party advisory |
http://seclists.org/fulldisclosure/2022/Oct/41 | third party advisory mailing list |
http://seclists.org/fulldisclosure/2022/Oct/28 | third party advisory mailing list |
https://security.gentoo.org/glsa/202305-16 | third party advisory vendor advisory |