Impact
The vulnerability is a stack buffer overflow in Vim’s NetBeans integration. When processing the specialKeys command, the special_keys() routine writes two bytes per iteration into a 64‑byte buffer on the stack without performing bounds checking. A malicious NetBeans server can send a single, crafted specialKeys command that overflows this buffer, potentially corrupting the stack and enabling arbitrary code execution or a crash. The issue affects Vim builds that enable the NetBeans feature and was fixed by patch v9.1.2148.
Affected Systems
The affected product is the Vim text editor, which is open‑source and command‑line based. All Vim installations that enable the NetBeans feature and run a version older than v9.1.2148 are vulnerable. The fix is upstreamed in Vim release v9.1.2148 and later.
Risk and Exploitability
The CVSS score of 5.4 reflects moderate severity. The EPSS score of less than 1 % indicates a very low probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be a malicious NetBeans server that can send the specialKeys payload. If an attacker controls such a server or influences the connection between Vim and a NetBeans server, they can trigger the overflow. Because the vulnerability requires a particular feature to be enabled and relies on a server interaction, the practical risk is moderate but the likelihood of exploitation is low.
OpenCVE Enrichment