Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-4069

Опубликовано: 03 дек. 2021
Источник: redhat
CVSS3: 4.8
EPSS Низкий

Описание

vim is vulnerable to Use After Free

A heap use-after-free flaw was found in Vim's ex_open() function in src/ex_docmd.c file. This flaw allows an attacker to trick the victim into opening a specially crafted file that triggers a use-after-free error, allowing the attacker to compromise the system and execute arbitrary code.

Отчет

This flaw has received a Low Severity rating because in order for the flaw to be triggered, a victim user must run an arbitrary input file (most likely provided by a malicious user) in Vim script mode using -s {scriptin}. Users running arbitrary Vim scripts are already open to security risks and this is NEVER recommended. Doing so with a privileged account is even more risky and not recommended. This flaw does not reproduce on versions of Vim shipped with Red Hat Enterprise Linux 7 or 8. Therefore, it has been marked as notaffected.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/openshift-hive-rhel8Not affected
Red Hat Enterprise Linux 6vimOut of support scope
Red Hat Enterprise Linux 7vimOut of support scope
Red Hat Enterprise Linux 8vimNot affected
Red Hat Enterprise Linux 9vimNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2029513vim: use-after-free in ex_open() in src/ex_docmd.c

EPSS

Процентиль: 37%
0.0016
Низкий

4.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 4 лет назад

vim is vulnerable to Use After Free

CVSS3: 7.8
nvd
около 4 лет назад

vim is vulnerable to Use After Free

CVSS3: 7.8
msrc
около 4 лет назад

Use After Free in vim/vim

CVSS3: 7.8
debian
около 4 лет назад

vim is vulnerable to Use After Free

CVSS3: 7.8
github
около 4 лет назад

vim is vulnerable to Use After Free

EPSS

Процентиль: 37%
0.0016
Низкий

4.8 Medium

CVSS3