Risk | High |
Patch available | YES |
Number of vulnerabilities | 7 |
CVE-ID | CVE-2022-1733 CVE-2022-1674 CVE-2022-1629 CVE-2022-1735 CVE-2022-1771 CVE-2022-1785 CVE-2022-1796 |
CWE-ID | CWE-122 CWE-476 CWE-125 CWE-120 CWE-121 CWE-787 CWE-416 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Vim Client/Desktop applications / Office applications |
Vendor |
This security bulletin contains information about 7 vulnerabilities.
EUVDB-ID: #VU63492
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-1733
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in skip_string() function. A remote attacker can trick the victim to open a specially crafted file, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsVim: before 8.2.4968
http://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a
http://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813
http://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63491
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-1674
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trick the victim to open a specially crafted file and perform a denial of service attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsVim: before 8.2.4938
http://huntr.dev/bounties/a74ba4a4-7a39-4a22-bde3-d2f8ee07b385
http://github.com/vim/vim/commit/a59f2dfd0cf9ee1a584d3de5b7c2d47648e79060
http://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ODXVYZC5Z4XRRZK7CK6B6IURYVYHA25U/
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63490
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-1629
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to a boundary condition in find_next_quote() function. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error, perform a denial of service attack, modify memory, and execute arbitrary code.
MitigationInstall updates from vendor's website.
Vulnerable software versionsVim: before 8.2.4925
http://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd
http://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee
http://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63489
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-1735
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in utfc_ptr2len() function. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsVim: before 8.2.4969
http://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97
http://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63488
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-1771
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to a boundary error when providing certain input. A remote attacker can trigger stack-based buffer overflow and perform a denial of service attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsVim: before 8.2.4975
http://huntr.dev/bounties/faa74175-5317-4b71-a363-dfc39094ecbb
http://github.com/vim/vim/commit/51f0bfb88a3554ca2dde777d78a59880d1ee37a8
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63487
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-1785
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code
The vulnerability exists due to a boundary error when processing untrusted input in vim_regsub_both() function. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsVim: before 8.2.4977
http://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109
http://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63485
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-1796
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a use-after-free error. A remote attacker can trick the victim to open a specially crafted file, trigger a use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsVim: before 8.2.4979
http://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5
http://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?