Description
Vim is an open source, command line text editor. Versions prior to 9.2.0077 have a heap-buffer-overflow and a segmentation fault (SEGV) exist in Vim's swap file recovery logic. Both are caused by unvalidated fields read from crafted pointer blocks within a swap file. Version 9.2.0077 fixes the issue.
Published: 2026-02-27
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

Vim contains a heap‑buffer overflow that is executed during swap file recovery. The bug is triggered when Vim parses unvalidated pointer blocks inside a swap file, causing memory corruption and a segmentation fault. Based on the description, it is inferred that an attacker who can supply a crafted swap file processed by Vim can force the editor to crash, thereby denying service to users who rely on Vim for editing or configuration.

Affected Systems

The vulnerability affects the Vim text editor from the Vim project. All releases older than v9.2.0077 are vulnerable. Upgrading to v9.2.0077 or later removes the unsafe swap‑file recovery code.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% suggests that exploitation is unlikely at this time. The flaw is not listed in CISA’s Known Exploited Vulnerabilities catalog. Exploitation requires an attacker to inject a malicious swap file that Vim will read during recovery; typical vectors include local file placement or, in contexts where Vim processes user‑supplied files (such as web or version‑control services), remote delivery of crafted swaps. No evidence points to remote code execution or other higher‑impact capabilities beyond application crash.

Generated by OpenCVE AI on April 17, 2026 at 13:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Vim to version 9.2.0077 or later, which removes the unsafe swap‑file recovery code.
  • Disable automatic recovery of swap files in environments where Vim may handle untrusted or user‑generated content, thereby preventing accidental crashes from crafted swap files.
  • Delete any existing swap files in directories that could be compromised to remove the trigger for the overflow.

Generated by OpenCVE AI on April 17, 2026 at 13:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*

Mon, 02 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Vim
Vim vim
Vendors & Products Vim
Vim vim

Sat, 28 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
References
Metrics threat_severity

None

threat_severity

Moderate


Sat, 28 Feb 2026 01:30:00 +0000

Type Values Removed Values Added
References

Fri, 27 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Description Vim is an open source, command line text editor. Versions prior to 9.2.0077 have a heap-buffer-overflow and a segmentation fault (SEGV) exist in Vim's swap file recovery logic. Both are caused by unvalidated fields read from crafted pointer blocks within a swap file. Version 9.2.0077 fixes the issue.
Title Vim has a heap-buffer-overflow and a segmentation fault
Weaknesses CWE-122
CWE-20
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-02T21:53:26.613Z

Reserved: 2026-02-27T15:54:05.136Z

Link: CVE-2026-28421

cve-icon Vulnrichment

Updated: 2026-02-28T00:15:36.679Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T22:16:25.493

Modified: 2026-03-04T20:47:36.620

Link: CVE-2026-28421

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-02-27T22:06:34Z

Links: CVE-2026-28421 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:00:15Z

Weaknesses