Vulnerability Details : CVE-2023-1170
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1376.
Vulnerability category: Overflow
Products affected by CVE-2023-1170
- cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-1170
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 48 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-1170
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.3
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
1.3
|
5.9
|
huntr.dev | |
6.6
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H |
1.8
|
4.7
|
NIST |
CWE ids for CVE-2023-1170
-
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().Assigned by: security@huntr.dev (Primary)
References for CVE-2023-1170
-
https://github.com/vim/vim/commit/1c73b65229c25e3c1fd8824ba958f7cc4d604f9c
patch 9.0.1376: accessing invalid memory with put in Visual block mode · vim/vim@1c73b65 · GitHubPatch
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4KDAU76Z7QNSPKZX2JAJ6O7KIEOXWTL/
[SECURITY] Fedora 37 Update: vim-9.0.1407-1.fc37 - package-announce - Fedora Mailing-Lists
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIAKPMKJ4OZ6NYRZJO7YWMNQL2BICLYV/
[SECURITY] Fedora 38 Update: vim-9.0.1407-1.fc38 - package-announce - Fedora Mailing-Lists
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
[SECURITY] Fedora 36 Update: vim-9.0.1407-1.fc36 - package-announce - Fedora Mailing-Lists
-
https://huntr.dev/bounties/286e0090-e654-46d2-ac60-29f81799d0a4
heap-buffer-overflow in utf_ptr2char vulnerability found in vimExploit;Patch;Third Party Advisory
Jump to