• CVE-2025-53905

发布时间: 2025年8月1日

修改时间: 2025年8月8日

概要

Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim’s tar.vim plugin can allow overwriting of arbitrary files when opening specially crafted tar archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1552 contains a patch for the vulnerability.

CVSS v3 指标

NVD openEuler
Confidentiality None
Attack Vector Local
CVSS评分 N/A 4.1
Attack Complexity High
Privileges Required None
Scope Changed
Integrity Low
User Interaction Required
Availability Low

安全公告

公告名 概要 发布时间
KylinSec-SA-2025-2771 vim security update 2025年9月8日
KylinSec-SA-2025-2787 vim security update 2025年8月14日
KylinSec-SA-2025-2800 vim security update 2025年9月22日

影响产品

产品 状态
KY3.4-5A vim Fixed
V6 vim Fixed
KY3.5.3 vim Fixed
KY3.5.2 vim Fixed