Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-1621

Опубликовано: 10 мая 2022
Источник: debian
EPSS Низкий

Описание

Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution

Пакеты

ПакетСтатусВерсия исправленияРелизТип
vimfixed2:9.0.0135-1package

Примечания

  • https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb

  • https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)

  • Crash in CLI tool, no security impact

EPSS

Процентиль: 26%
0.00086
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 3 лет назад

Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution

CVSS3: 7.3
redhat
около 3 лет назад

Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution

CVSS3: 7.8
nvd
около 3 лет назад

Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution

CVSS3: 7.8
msrc
около 3 лет назад

Описание отсутствует

CVSS3: 7.8
github
около 3 лет назад

Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution

EPSS

Процентиль: 26%
0.00086
Низкий
Уязвимость CVE-2022-1621