Lucene search

K
cvelist@huntrdevCVELIST:CVE-2022-1621
HistoryMay 09, 2022 - 12:00 a.m.

CVE-2022-1621 Heap buffer overflow in vim_strncpy find_word in vim/vim

2022-05-0900:00:00
CWE-122
@huntrdev
www.cve.org
10
cve-2022-1621
heap buffer overflow
vim_strncpy find_word
github repository
software crashing
bypass protection mechanism
modify memory
remote execution

CVSS3

7.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H

AI Score

8.3

Confidence

High

EPSS

0.004

Percentile

72.1%

Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution

CNA Affected

[
  {
    "vendor": "vim",
    "product": "vim/vim",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "8.2.4919",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

7.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H

AI Score

8.3

Confidence

High

EPSS

0.004

Percentile

72.1%