Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Vim | Vim | * | 8.2.4956 (excluding) |
Vim | Ubuntu | bionic | * |
Vim | Ubuntu | esm-infra-legacy/trusty | * |
Vim | Ubuntu | esm-infra/xenial | * |
Vim | Ubuntu | focal | * |
Vim | Ubuntu | impish | * |
Vim | Ubuntu | jammy | * |
Vim | Ubuntu | trusty/esm | * |
Vim | Ubuntu | upstream | * |