First published: Wed Aug 21 2024(Updated: )
It was discovered that vim incorrectly handled parsing of filenames in its search functionality. If a user was tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service. (CVE-2021-3973) It was discovered that vim incorrectly handled memory when opening and searching the contents of certain files. If a user was tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service, or possibly achieve code execution with user privileges. (CVE-2021-3974) It was discovered that vim incorrectly handled memory when opening and editing certain files. If a user was tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service, or possibly achieve code execution with user privileges. (CVE-2021-3984, CVE-2021-4019, CVE-2021-4069)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/vim | <2:7.4.052-1ubuntu3.1+esm17 | 2:7.4.052-1ubuntu3.1+esm17 |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-6965-1 is classified as high due to its potential to cause denial of service.
To fix USN-6965-1, update the vim package to version 2:7.4.052-1ubuntu3.1+esm17.
USN-6965-1 affects Ubuntu 14.04 systems running vim version up to 2:7.4.052-1ubuntu3.1+esm17.
USN-6965-1 is a denial of service vulnerability related to improper handling of filenames in vim.
There are no public exploits disclosed for USN-6965-1, but it is critical to patch the vulnerability to prevent potential attacks.