CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
47.2%
It was discovered that Vim incorrectly handled permissions on the .swp
file. A local attacker could possibly use this issue to obtain sensitive
information. This issue only affected Ubuntu 14.04 ESM. (CVE-2017-17087)
It was discovered that Vim incorrectly handled restricted mode. A local
attacker could possibly use this issue to bypass restricted mode and
execute arbitrary commands. Note: This update only makes executing shell
commands more difficult. Restricted mode should not be considered a
complete security measure. This issue only affected Ubuntu 14.04 ESM.
(CVE-2019-20807)
Brian Carpenter discovered that vim incorrectly handled memory
when opening certain files. If a user was tricked into opening
a specially crafted file, a remote attacker could crash the
application, leading to a denial of service, or possible execute
arbitrary code with user privileges. This issue only affected
Ubuntu 20.04 LTS, Ubuntu 21.04 and Ubuntu 21.10. (CVE-2021-3872)
It was discovered that vim incorrectly handled memory when
opening certain files. If a user was tricked into opening
a specially crafted file, a remote attacker could crash the
application, leading to a denial of service, or possible execute
arbitrary code with user privileges. (CVE-2021-3903)
It was discovered that vim incorrectly handled memory when
opening certain files. If a user was tricked into opening
a specially crafted file, a remote attacker could crash the
application, leading to a denial of service, or possible execute
arbitrary code with user privileges. (CVE-2021-3927)
It was discovered that vim incorrectly handled memory when
opening certain files. If a user was tricked into opening
a specially crafted file, a remote attacker could crash the
application, leading to a denial of service, or possible execute
arbitrary code with user privileges. (CVE-2021-3928)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 21.10 | noarch | vim | <Â 2:8.2.2434-3ubuntu3.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | vim-athena | <Â 2:8.2.2434-3ubuntu3.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | vim-athena-dbgsym | <Â 2:8.2.2434-3ubuntu3.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | vim-common | <Â 2:8.2.2434-3ubuntu3.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | vim-dbgsym | <Â 2:8.2.2434-3ubuntu3.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | vim-doc | <Â 2:8.2.2434-3ubuntu3.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | vim-gtk | <Â 2:8.2.2434-3ubuntu3.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | vim-gtk3 | <Â 2:8.2.2434-3ubuntu3.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | vim-gtk3-dbgsym | <Â 2:8.2.2434-3ubuntu3.1 | UNKNOWN |
Ubuntu | 21.10 | noarch | vim-gui-common | <Â 2:8.2.2434-3ubuntu3.1 | UNKNOWN |
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
47.2%