Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

Vim's NetBeans Integration Allows Malicious Servers to Crash the Program

OESA-2026-1500
Summary

A security update has fixed a vulnerability in the Vim text editor's integration with NetBeans. This issue allowed a malicious NetBeans server to crash the Vim editor by sending a specially crafted command. To stay safe, update to the latest version of Vim, version 9.1.2148 or later.

What to do
  • Update vim to version 9.0.2092-25.oe2403sp2.
Affected software
VendorProductAffected versionsFix available
– vim <= 9.0.2092-25.oe2403sp2 9.0.2092-25.oe2403sp2
Original title
vim security update
Original description
Vim is an advanced text editor that seeks to provide the power of the de-facto Unix editor &amp;apos;Vi&amp;apos;, with a more complete feature set. Vim is a highly configurable text editor built to enable efficient text editing. It is an improved version of the vi editor distributed with most UNIX systems.

Security Fix(es):

Vim is an open source, command line text editor. Prior to 9.1.2148, a stack buffer overflow vulnerability exists in Vim&apos;s NetBeans integration when processing the specialKeys command, affecting Vim builds that enable and use the NetBeans feature. The Stack buffer overflow exists in special_keys() (in src/netbeans.c). The while (*tok) loop writes two bytes per iteration into a 64-byte stack buffer (keybuf) with no bounds check. A malicious NetBeans server can overflow keybuf with a single specialKeys command. The issue has been fixed as of Vim patch v9.1.2148.(CVE-2026-26269)
Published: 6 Mar 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026