![]() ![]() The vulnerability exists due to a boundary condition within the build_stl_str_hl() function in buffer.c. The vulnerability allows a remote attacker to gain access to potentially sensitive information. Is there known malware, which exploits this vulnerability? Vim-nox-py2 (Ubuntu package): before Ubuntu Pro (Infra-only) Vim-athena-py2 (Ubuntu package): before Ubuntu Pro (Infra-only) Vim-gtk3-py2 (Ubuntu package): before Ubuntu Pro (Infra-only) Vim-gtk-py2 (Ubuntu package): before Ubuntu Pro (Infra-only) Vim-athena (Ubuntu package): before 2:-1ubuntu1.11 Vim-tiny (Ubuntu package): before 2:-1ubuntu1.11 Vim (Ubuntu package): before 2:-1ubuntu1.11 Vim-gtk3 (Ubuntu package): before 2:-1ubuntu1.11 Vim-nox (Ubuntu package): before 2:-1ubuntu1.11 Vim-gtk (Ubuntu package): before 2:-1ubuntu1.11 Update the affected package vim to the latest version. A remote attacker can perform a denial of service (DoS) attack. The vulnerability exists due to a NULL pointer dereference error in the gui_x11_create_blank_mouse(0 function in gui_x11.c. The vulnerability allows a remote attacker to perform a denial of service (DoS) attack. CWE-ID: CWE-476 - NULL Pointer Dereference ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |