CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
54.3%
It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possibly execute arbitrary code. This
issue only affected Ubuntu 22.04 LTS. (CVE-2022-2182)
It was discovered that Vim incorrectly handled memory when deleting buffers
in diff mode. An attacker could possibly use this issue to cause a denial
of service. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-2208)
It was discovered that Vim incorrectly handled memory access. An attacker
could possibly use this issue to cause the corruption of sensitive
information, a crash, or arbitrary code execution. This issue only affected
Ubuntu 14.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-2210)
It was discovered that Vim incorrectly handled memory when using nested
:source. An attacker could possibly use this issue to cause a denial of
service. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-2231)
It was discovered that Vim did not properly perform bounds checks when
processing a menu item with the only modifier. An attacker could possibly
use this issue to cause a denial of service. (CVE-2022-2257)
It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possibly execute arbitrary code.
(CVE-2022-2264, CVE-2022-2284, CVE-2022-2289)
It was discovered that Vim did not properly perform bounds checks when
going over the end of the typahead. An attacker could possibly use this
issue to cause a denial of service. (CVE-2022-2285)
It was discovered that Vim did not properly perform bounds checks when
reading the provided string. An attacker could possibly use this issue to
cause a denial of service. (CVE-2022-2286)
It was discovered that Vim incorrectly handled memory when adding words
with a control character to the internal spell word list. An attacker could
possibly use this issue to cause a denial of service. (CVE-2022-2287)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 22.04 | noarch | vim-athena | < 2:8.2.3995-1ubuntu2.10 | UNKNOWN |
Ubuntu | 22.04 | noarch | vim | < 2:8.2.3995-1ubuntu2.10 | UNKNOWN |
Ubuntu | 22.04 | noarch | vim-athena-dbgsym | < 2:8.2.3995-1ubuntu2.10 | UNKNOWN |
Ubuntu | 22.04 | noarch | vim-common | < 2:8.2.3995-1ubuntu2.10 | UNKNOWN |
Ubuntu | 22.04 | noarch | vim-dbgsym | < 2:8.2.3995-1ubuntu2.10 | UNKNOWN |
Ubuntu | 22.04 | noarch | vim-doc | < 2:8.2.3995-1ubuntu2.10 | UNKNOWN |
Ubuntu | 22.04 | noarch | vim-gtk | < 2:8.2.3995-1ubuntu2.10 | UNKNOWN |
Ubuntu | 22.04 | noarch | vim-gtk3 | < 2:8.2.3995-1ubuntu2.10 | UNKNOWN |
Ubuntu | 22.04 | noarch | vim-gtk3-dbgsym | < 2:8.2.3995-1ubuntu2.10 | UNKNOWN |
Ubuntu | 22.04 | noarch | vim-gui-common | < 2:8.2.3995-1ubuntu2.10 | UNKNOWN |
ubuntu.com/security/CVE-2022-2182
ubuntu.com/security/CVE-2022-2208
ubuntu.com/security/CVE-2022-2210
ubuntu.com/security/CVE-2022-2231
ubuntu.com/security/CVE-2022-2257
ubuntu.com/security/CVE-2022-2264
ubuntu.com/security/CVE-2022-2284
ubuntu.com/security/CVE-2022-2285
ubuntu.com/security/CVE-2022-2286
ubuntu.com/security/CVE-2022-2287
ubuntu.com/security/CVE-2022-2289
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
54.3%