Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-2124

Опубликовано: 19 июн. 2022
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

Buffer Over-read in GitHub repository vim/vim prior to 8.2.

Отчет

Red Hat Product Security has rated this issue as having a Low security impact, because the "victim" has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ Red Hat Enterprise Linux 6 and 7 are out of support scope for this flaw. To learn more about RHEL support scopes, please see https://access.redhat.com/support/policy/updates/errata/ .

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6vimOut of support scope
Red Hat Enterprise Linux 7vimOut of support scope
Red Hat Enterprise Linux 8vimFix deferred
Red Hat Enterprise Linux 9vimFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-126
https://bugzilla.redhat.com/show_bug.cgi?id=2099558vim: out of bounds read in current_quote()

EPSS

Процентиль: 38%
0.00165
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 3 лет назад

Buffer Over-read in GitHub repository vim/vim prior to 8.2.

CVSS3: 7.8
nvd
больше 3 лет назад

Buffer Over-read in GitHub repository vim/vim prior to 8.2.

CVSS3: 7.8
msrc
больше 3 лет назад

Buffer Over-read in vim/vim

CVSS3: 7.8
debian
больше 3 лет назад

Buffer Over-read in GitHub repository vim/vim prior to 8.2.

CVSS3: 7.8
github
больше 3 лет назад

Buffer Over-read in GitHub repository vim/vim prior to 8.2.

EPSS

Процентиль: 38%
0.00165
Низкий

7.8 High

CVSS3