Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

Vim's NetBeans Integration Allows Malicious Server to Crash Editor

OESA-2026-1497
Summary

Vim's integration with NetBeans, a popular development tool, allows a malicious NetBeans server to cause the Vim editor to crash. This can happen if you have the NetBeans feature enabled in Vim and connect to a malicious server. Update to the latest version of Vim (at least 9.1.2148) to fix this issue.

What to do
  • Update vim to version 9.0-39.oe2203sp4.
Affected software
VendorProductAffected versionsFix available
– vim <= 9.0-39.oe2203sp4 9.0-39.oe2203sp4
Original title
vim security update
Original description
Vim is an advanced text editor that seeks to provide the power of the de-facto Unix editor &amp;apos;Vi&amp;apos;, with a more complete feature set. Vim is a highly configurable text editor built to enable efficient text editing. It is an improved version of the vi editor distributed with most UNIX systems.

Security Fix(es):

Vim is an open source, command line text editor. Prior to 9.1.2148, a stack buffer overflow vulnerability exists in Vim&apos;s NetBeans integration when processing the specialKeys command, affecting Vim builds that enable and use the NetBeans feature. The Stack buffer overflow exists in special_keys() (in src/netbeans.c). The while (*tok) loop writes two bytes per iteration into a 64-byte stack buffer (keybuf) with no bounds check. A malicious NetBeans server can overflow keybuf with a single specialKeys command. The issue has been fixed as of Vim patch v9.1.2148.(CVE-2026-26269)
Published: 6 Mar 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026