Description
vim is vulnerable to Heap-based Buffer Overflow
References (9)
Core 9
Core References
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2022/01/15/1
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202208-32
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
Patch, Third Party Advisory
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
Exploit, Third Party Advisory
https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
Scores
CVSS v3
7.8
EPSS
0.0021
EPSS Percentile
42.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
CWE
CWE-122
CWE-787
Status
published
Products (5)
debian/debian_linux
9.0
debian/debian_linux
10.0
fedoraproject/fedora
34
fedoraproject/fedora
35
vim/vim
< 8.2.3669
Published
Dec 01, 2021
Tracked Since
Feb 18, 2026