Impact
Vim versions prior to 9.2.0074 contain a heap‑based buffer overflow that occurs when parsing Emacs‑style tags files. A malformed tags file can cause Vim to read up to seven bytes beyond the allocated memory boundary. The description does not confirm code execution, but reads beyond the boundary could lead to information leakage or instability.
Affected Systems
The vulnerability affects the Vim text editor by the Vim project. All releases before Vim 9.2.0074 are impacted; versions 9.2.0074 and later include the fix.
Risk and Exploitability
The CVSS score of 4.4 indicates a moderate severity, and the EPSS score of less than 1% reflects a low probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is local; an attacker must supply a crafted tags file when running Vim. The buffer overflow is a read out‑of‑bounds, so the attack requires local access to execute the program with the malicious file. No remote exploitation path is documented, and the risk remains moderate given the low exploitation probability.
OpenCVE Enrichment