5.5
CVSSv3

CVE-2022-1674

CVSSv4: NA | CVSSv3: 5.5 | CVSSv2: 4.3 | VMScore: 650 | EPSS: 0.00116 | KEV: Not Included
Published: 12/05/2022 Updated: 21/11/2024

Vulnerability Summary

NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim before 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows malicious users to cause a denial of service (application crash) via a crafted input.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vim vim

fedoraproject fedora 34

fedoraproject fedora 35

fedoraproject fedora 36

apple macos

Vendor Advisories

Several security issues were fixed in Vim ...
Use after free in append_command in GitHub repository vim/vim prior to 824895 This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution (CVE-2022-1616) Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 824899 This vulnerabilities ...
Use after free in append_command in GitHub repository vim/vim prior to 824895 This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution (CVE-2022-1616) Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 824899 This vulnerabilities ...
NULL Pointer Dereference in function vim_regexec_string at regexpc:2733 in GitHub repository vim/vim prior to 824938 NULL Pointer Dereference in function vim_regexec_string at regexpc:2733 allows attackers to cause a denial of service (application crash) via a crafted input ...

References

CWE-476CWE-476https://nvd.nist.govhttps://ubuntu.com/security/notices/USN-5723-1https://www.first.org/epsshttp://seclists.org/fulldisclosure/2022/Oct/28http://seclists.org/fulldisclosure/2022/Oct/41https://github.com/vim/vim/commit/a59f2dfd0cf9ee1a584d3de5b7c2d47648e79060https://huntr.dev/bounties/a74ba4a4-7a39-4a22-bde3-d2f8ee07b385https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ODXVYZC5Z4XRRZK7CK6B6IURYVYHA25U/https://security.gentoo.org/glsa/202208-32https://security.gentoo.org/glsa/202305-16https://support.apple.com/kb/HT213488http://seclists.org/fulldisclosure/2022/Oct/28http://seclists.org/fulldisclosure/2022/Oct/41https://github.com/vim/vim/commit/a59f2dfd0cf9ee1a584d3de5b7c2d47648e79060https://huntr.dev/bounties/a74ba4a4-7a39-4a22-bde3-d2f8ee07b385https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ODXVYZC5Z4XRRZK7CK6B6IURYVYHA25U/https://security.gentoo.org/glsa/202208-32https://security.gentoo.org/glsa/202305-16https://support.apple.com/kb/HT213488