Description
Vim is an open source, command line text editor. Prior to 9.1.2148, a stack buffer overflow vulnerability exists in Vim's NetBeans integration when processing the specialKeys command, affecting Vim builds that enable and use the NetBeans feature. The Stack buffer overflow exists in special_keys() (in src/netbeans.c). The while (*tok) loop writes two bytes per iteration into a 64-byte stack buffer (keybuf) with no bounds check. A malicious NetBeans server can overflow keybuf with a single specialKeys command. The issue has been fixed as of Vim patch v9.1.2148.
INFO
Published Date :
2026-02-13T19:18:41.662Z
Last Modified :
2026-02-13T21:11:26.275Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-26269 vulnerability.
| Vendors | Products |
|---|---|
| Vim |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-26269.