CVE-2024-22667

CVSS 3.1 Score 7.8 of 10 (high)

Details

Published Feb 5, 2024
Updated: Feb 23, 2024
CWE ID 787

Summary

CVE-2024-22667 is a stack-based buffer overflow vulnerability found in Vim before version 9.0.2142. This vulnerability affects various products, including kPHicW, pqRTJN, WJ2fHZ, and many others. The vulnerability occurs when the function did_set_langmap in map.c uses sprintf to write to the error buffer passed down to the option callback functions. The base severity of this vulnerability is rated as HIGH with a base score of 7.8 according to [email protected]. It requires low privileges and user interaction is not required for exploitation. The attack vector is local, and it has a high impact on integrity and confidentiality. The exploitability score is 1.8 out of 10, indicating that it is relatively easy to exploit. Organizations should apply the necessary updates or patches provided by Vim to remediate this vulnerability as it poses a potential danger to their systems and data security.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-22667 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions