CVE-2022-1619
Published: 8 May 2022
Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution
Priority
Status
Package | Release | Status |
---|---|---|
vim Launchpad, Ubuntu, Debian |
bionic |
Released
(2:8.0.1453-1ubuntu1.9)
|
impish |
Ignored
(end of life)
|
|
jammy |
Released
(2:8.2.3995-1ubuntu2.1)
|
|
upstream |
Released
(8.2.4899)
|
|
focal |
Released
(2:8.1.2269-1ubuntu5.8)
|
|
Patches: upstream: https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619
- https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450
- https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe
- https://ubuntu.com/security/notices/USN-5460-1
- https://ubuntu.com/security/notices/USN-5613-1
- NVD
- Launchpad
- Debian