Select your cookie preferences

We use cookies and similar tools to enhance your experience, provide our services, deliver relevant advertising, and make improvements. Approved third parties also use these tools to help us deliver advertising and provide certain site features.

CVE-2023-1170

Public on 2023-03-03
Modified on 2024-01-12
Description

A heap-based buffer overflow vulnerability was found in GitHub repository vim/vim prior to 9.0.1376 in Vim's utf_ptr2char() function of the src/mbyte.c file. This flaw occurs because there is access to invalid memory with put in visual block mode. An attacker can trick a user into opening a specially crafted file, triggering an out-of-bounds read that causes an application to crash, leading to a denial of service.

Severity
Medium
See what this means
CVSS v3 Base Score
6.6
See breakdown
Continue reading

Affected Packages

Platform Package Release Date Advisory
Amazon Linux 1 vim 2023-03-30 22:50 ALAS-2023-1716
Amazon Linux 2 - Core vim 2023-03-30 18:56 ALAS2-2023-2005
Amazon Linux 2023 vim 2023-03-30 21:11 ALAS2023-2023-151

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
NVD CVSSv3 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H