Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-2175

Опубликовано: 23 июн. 2022
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

Buffer Over-read in GitHub repository vim/vim prior to 8.2.

A heap buffer over-read vulnerability was found in Vim's put_on_cmdline() function of the src/ex_getln.c file. This issue occurs due to invalid memory access when using an expression on the command line. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap buffer overflow that causes an application to crash and corrupt memory.

Отчет

All versions of Vim shipped with Red Hat Enterprise Linux are affected, because of the presence of vulnerable code in our code-base. Red Hat Product Security has rated this issue as having a Low security impact because the "victim" has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it. Since Red Hat Enterprise Linux 6, 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle & Updates Policy: https://access.redhat.com/support/policy/updates/errata/.

Меры по смягчению последствий

Untrusted vim scripts with -s [scriptin] are not recommended to run.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6vimOut of support scope
Red Hat Enterprise Linux 7vimOut of support scope
Red Hat Enterprise Linux 8vimFix deferred
Red Hat Enterprise Linux 9vimFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-126
https://bugzilla.redhat.com/show_bug.cgi?id=2101293vim: buffer over-read in put_on_cmdline() at ex_getln.c

EPSS

Процентиль: 27%
0.00093
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 3 года назад

Buffer Over-read in GitHub repository vim/vim prior to 8.2.

CVSS3: 7.8
nvd
почти 3 года назад

Buffer Over-read in GitHub repository vim/vim prior to 8.2.

CVSS3: 7.8
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 7.8
debian
почти 3 года назад

Buffer Over-read in GitHub repository vim/vim prior to 8.2.

CVSS3: 8.8
github
почти 3 года назад

Buffer Over-read in GitHub repository vim/vim prior to 8.2.

EPSS

Процентиль: 27%
0.00093
Низкий

7.8 High

CVSS3