Lucene search

K
redosRedosROS-20221004-01
HistoryOct 04, 2022 - 12:00 a.m.

ROS-20221004-01

2022-10-0400:00:00
redos.red-soft.ru
24

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

4.4 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

39.2%

Vim text editor vulnerability is related to a boundary error during file processing in the function
ex_finally() in ex_eval.c. Exploitation of the vulnerability could allow an attacker acting remotely,
create a special file, force the victim to open it, cause memory corruption, and execute
arbitrary code on the target system

The Vim text editor vulnerability involves the use of a negative array index with a window of
of negative width in the win_redr_ruler function at drawscreen.c. Exploitation of the vulnerability could allow
an attacker acting remotely to create a special file, force the victim to open it, and execute
arbitrary code on the target system

Vim text editor vulnerability is related to a post-release memory usage error in the function
process_next_cpt_value() in insexpand.c when processing files. Exploitation of the vulnerability could allow
an attacker acting remotely to trick a victim into opening a specially crafted file, trigger a
a usage error upon release and execute arbitrary code on the system

A vulnerability in the Vim text editor is related to a NULL pointer dereference error in eval.c.
Exploitation of the vulnerability could allow an attacker acting remotely to execute a denial-of-service (DoS) attack.
denial of service (DoS) attack

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64vim-x11<= 8.2.4701-10UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

4.4 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

39.2%