Lucene search

K
redosRedosROS-20220701-01
HistoryJul 01, 2022 - 12:00 a.m.

ROS-20220701-01

2022-07-0100:00:00
redos.red-soft.ru
21

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

79.1%

Vim text editor vulnerability is related to boundary conditions in textobject.c. Exploitation
The vulnerability could allow a remote attacker to create a special file, trick the victim into opening it, cause a read error outside the boundaries, and read the memory contents.
victim to open it, cause an out-of-bounds read error, and read the contents of memory in the
system

The Vim text editor vulnerability is related to a boundary error in buffer.c. Exploiting the vulnerability
could allow an attacker acting remotely to create a special file, trick the victim into opening it, cause a buffer overflow.
open it, cause a heap buffer overflow, and execute arbitrary code on the target system

Vim text editor vulnerability is related to a boundary error in edit.c. Exploitation of the vulnerability could
allow a remote attacker to create a special file, trick the victim into opening it, cause a buffer overflow, and execute arbitrary code.
it, cause a heap buffer overflow, and execute arbitrary code on the target system

Vim text editor vulnerability is related to a boundary error in ex_docmd.c. Exploitation of the vulnerability
could allow a remote attacker to create a special file, trick the victim into opening it, and cause a buffer overflow.
open it, cause a heap buffer overflow, and execute arbitrary code on the target system

Vim text editor vulnerability is related to a boundary error in register.c. Exploitation of the vulnerability
could allow a remote attacker to create a special file, trick the victim into opening it, cause a heap buffer overflow, and execute arbitrary code.
open it, cause a heap buffer overflow, and execute arbitrary code on the target system

Vim text editor vulnerability is related to boundary conditions in normal.c. Exploiting the vulnerability
could allow an attacker acting remotely to create a special file, trick the victim into opening it, cause a read error outside the boundary.
open it, cause a read error outside of the boundary conditions, and read the memory contents on the system

The Vim text editor vulnerability involves an out-of-bounds error when processing unreliable input data
in diff.c. Exploitation of the vulnerability could allow an attacker acting remotely to create a specialized
file, trick the victim into opening it, and initiate unauthorized writing and execution of arbitrary code on the target system.
arbitrary code on the target system

Vim text editor vulnerability is related to a memory usage error in the spell.c file. Exploitation
exploitation of the vulnerability could allow a remote attacker to create a special file, trick the victim into opening it, and cause a bug.
the victim to open it, cause a usage error upon release, and execute arbitrary
code on the system

The Vim text editor vulnerability is related to boundary conditions in spellsuggest.c. Exploitation of the
the vulnerability could allow an attacker acting remotely to create a special file, trick a victim into opening it, cause a usage error upon release, and execute arbitrary code.
victim to open it, cause a read error outside of the boundary conditions, and read the memory contents of the
system

Vim text editor vulnerability is related to boundary conditions in ex_getln.c. Exploitation of the vulnerability
could allow an attacker acting remotely to create a special file, trick the victim into opening it, and cause a read error.
to open it, cause a read error outside of the boundary conditions, and read the contents of memory on the system

A vulnerability in the Vim text editor is related to a NULL pointer dereference error in diff.c.
Exploitation of the vulnerability could allow an attacker acting remotely to perform a denial-of-service (DoS) attack.
denial of service (DoS) attack

Vim text editor vulnerability is related to boundary conditions in indent.c. Exploitation of the vulnerability
could allow an attacker acting remotely to create a special file, trick the victim into opening it, cause a read error outside the boundaries of the file.
to open it, cause a read error outside of the boundary conditions, and read the contents of memory on the system

The Vim text editor vulnerability is related to a boundary error in indent.c. Exploitation of the vulnerability
could allow an attacker acting remotely to create a special file, trick the victim into opening it, cause a buffer overflow.
open it, cause a heap buffer overflow, and execute arbitrary code on the target system

Vim text editor vulnerability is related to boundary conditions in term.c. Exploiting the vulnerability
could allow an attacker acting remotely to create a special file, trick the victim into opening it, cause a read error outside the boundary.
open it, cause a read error outside of the boundary conditions, and read the memory contents on the system

The Vim text editor vulnerability involves a boundary error when processing untrusted input data in ex_docmd.ex_docmd.ex_docmd.ex_docmd.ex_docmd.
data in ex_docmd.c. Exploitation of the vulnerability could allow an attacker acting remotely to create a special file, trick the victim into reading the contents of memory.
a special file, trick the victim into opening it, and initiate unauthorized writing and
execution of arbitrary code on the target system

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64vim-x11<= 8.2.4701-5UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

79.1%