Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-4141

Опубликовано: 25 нояб. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.8

Описание

Heap based buffer overflow in vim/vim 9.0.0946 and below by allowing an attacker to CTRL-W gf in the expression used in the RHS of the substitute command.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

2:9.0.1672-1ubuntu2
esm-infra-legacy/trusty

ignored

change too intrusive
esm-infra/bionic

ignored

change too intrusive
esm-infra/focal

ignored

change too intrusive
esm-infra/xenial

ignored

change too intrusive
focal

ignored

end of standard support, was ignored [change too intrusive]
jammy

ignored

change too intrusive
kinetic

ignored

end of life, was needs-triage
lunar

not-affected

2:9.0.1000-4ubuntu3.1

Показывать по

Ссылки на источники

EPSS

Процентиль: 12%
0.00039
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
redhat
около 3 лет назад

Heap based buffer overflow in vim/vim 9.0.0946 and below by allowing an attacker to CTRL-W gf in the expression used in the RHS of the substitute command.

CVSS3: 7.8
nvd
около 3 лет назад

Heap based buffer overflow in vim/vim 9.0.0946 and below by allowing an attacker to CTRL-W gf in the expression used in the RHS of the substitute command.

CVSS3: 7.8
msrc
около 3 лет назад

Heap-based Buffer Overflow in vim/vim

CVSS3: 7.8
debian
около 3 лет назад

Heap based buffer overflow in vim/vim 9.0.0946 and below by allowing a ...

CVSS3: 7.8
github
около 3 лет назад

The target's backtrace indicates that libc has detected a heap error or that the target was executing a heap function when it stopped. This could be due to heap corruption, passing a bad pointer to a heap function such as free(), etc. Since heap errors might include buffer overflows, use-after-free situations, etc. they are generally considered exploitable.

EPSS

Процентиль: 12%
0.00039
Низкий

7.8 High

CVSS3