CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
31.4%
It was discovered that Vim was using uninitialized memory when fuzzy
matching, which could lead to invalid memory access. An attacker could
possibly use this issue to cause a denial of service or execute arbitrary
code. This issue only affected Ubuntu 22.04 LTS, Ubuntu 22.10 and Ubuntu
23.04. (CVE-2023-2426)
It was discovered that Vim was not properly performing bounds checks when
processing register contents, which could lead to a NULL pointer
dereference. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. (CVE-2023-2609)
It was discovered that Vim was not properly limiting the length of
substitution expression strings, which could lead to excessive memory
consumption. An attacker could possibly use this issue to cause a denial
of service. (CVE-2023-2610)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 23.04 | noarch | vim | < 2:9.0.1000-4ubuntu3.1 | UNKNOWN |
Ubuntu | 23.04 | noarch | vim-athena | < 2:9.0.1000-4ubuntu3.1 | UNKNOWN |
Ubuntu | 23.04 | noarch | vim-common | < 2:9.0.1000-4ubuntu3.1 | UNKNOWN |
Ubuntu | 23.04 | noarch | vim-dbgsym | < 2:9.0.1000-4ubuntu3.1 | UNKNOWN |
Ubuntu | 23.04 | noarch | vim-doc | < 2:9.0.1000-4ubuntu3.1 | UNKNOWN |
Ubuntu | 23.04 | noarch | vim-gtk3 | < 2:9.0.1000-4ubuntu3.1 | UNKNOWN |
Ubuntu | 23.04 | noarch | vim-gtk3-dbgsym | < 2:9.0.1000-4ubuntu3.1 | UNKNOWN |
Ubuntu | 23.04 | noarch | vim-gui-common | < 2:9.0.1000-4ubuntu3.1 | UNKNOWN |
Ubuntu | 23.04 | noarch | vim-motif | < 2:9.0.1000-4ubuntu3.1 | UNKNOWN |
Ubuntu | 23.04 | noarch | vim-motif-dbgsym | < 2:9.0.1000-4ubuntu3.1 | UNKNOWN |