Vulnerability Details : CVE-2018-20786
Potential exploit
libvterm through 0+bzr726, as used in Vim and other products, mishandles certain out-of-memory conditions, leading to a denial of service (application crash), related to screen.c, state.c, and vterm.c.
Vulnerability category: Denial of service
Products affected by CVE-2018-20786
- cpe:2.3:a:leonerd:libvterm:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-20786
0.60%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 67 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-20786
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2018-20786
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-20786
-
https://usn.ubuntu.com/4309-1/
USN-4309-1: Vim vulnerabilities | Ubuntu security notices
-
https://github.com/vim/vim/commit/cd929f7ba8cc5b6d6dcf35c8b34124e969fed6b8
patch 8.1.0633: crash when out of memory while opening a terminal window · vim/vim@cd929f7 · GitHubPatch;Third Party Advisory
-
https://github.com/vim/vim/issues/3711
Possible NPD error · Issue #3711 · vim/vim · GitHubExploit;Third Party Advisory
Jump to