CVE-2025-1215

A vulnerability classified as problematic was found in vim up to 9.1.1096. This vulnerability affects unknown code of the file src/main.c. The manipulation of the argument --log leads to memory corruption. It is possible to launch the attack on the local host. Upgrading to version 9.1.1097 is able to address this issue. The patch is identified as c5654b84480822817bb7b69ebc97c174c91185e9. It is recommended to upgrade the affected component.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*

History

13 Aug 2025, 17:28

Type Values Removed Values Added
CPE cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
First Time Vim
Vim vim
Netapp bootstrap Os
Netapp
References () https://github.com/vim/vim/commit/c5654b84480822817bb7b69ebc97c174c91185e9 - () https://github.com/vim/vim/commit/c5654b84480822817bb7b69ebc97c174c91185e9 - Patch
References () https://github.com/vim/vim/issues/16606 - () https://github.com/vim/vim/issues/16606 - Exploit, Issue Tracking
References () https://github.com/vim/vim/releases/tag/v9.1.1097 - () https://github.com/vim/vim/releases/tag/v9.1.1097 - Release Notes
References () https://vuldb.com/?ctiid.295174 - () https://vuldb.com/?ctiid.295174 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.295174 - () https://vuldb.com/?id.295174 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.497546 - () https://vuldb.com/?submit.497546 - Third Party Advisory, VDB Entry
References () https://security.netapp.com/advisory/ntap-20250321-0005/ - () https://security.netapp.com/advisory/ntap-20250321-0005/ - Third Party Advisory

21 Mar 2025, 18:15

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad clasificada como problemática en vim hasta la versión 9.1.1096. Esta vulnerabilidad afecta al código desconocido del archivo src/main.c. La manipulación del argumento --log provoca la corrupción de la memoria. Es posible lanzar el ataque en el host local. La actualización a la versión 9.1.1097 puede solucionar este problema. El parche se identifica como c5654b84480822817bb7b69ebc97c174c91185e9. Se recomienda actualizar el componente afectado.
References
  • () https://security.netapp.com/advisory/ntap-20250321-0005/ -

12 Feb 2025, 20:15

Type Values Removed Values Added
References () https://github.com/vim/vim/issues/16606 - () https://github.com/vim/vim/issues/16606 -
References () https://vuldb.com/?submit.497546 - () https://vuldb.com/?submit.497546 -

12 Feb 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-12 19:15

Updated : 2025-08-13 17:28


NVD link : CVE-2025-1215

Mitre link : CVE-2025-1215

CVE.ORG link : CVE-2025-1215


JSON object : View

Products Affected

vim

  • vim

netapp

  • bootstrap_os
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer