NA

CVE-2022-3134

Published: 06/09/2022 Updated: 25/01/2024
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

Use After Free in GitHub repository vim/vim before 9.0.0389.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vim vim

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #1019590 vim: CVE-2022-2946 CVE-2022-2982 CVE-2022-3037 CVE-2022-3099 CVE-2022-3134 Package: src:vim; Maintainer for src:vim is Debian Vim Maintainers <team+vim@trackerdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Mon, 12 Sep 2022 18:30:02 UTC Severity: important Tags: ...
A heap buffer overflow vulnerability was found in vim's ins_compl_infercase_gettext() function of the src/insexpandc file This flaw occurs when vim tries to access uninitialized memory when completing a long line This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap-based buffer overflow that cause ...
A heap use-after-free vulnerability was found in vim's do_tag() function of the src/tagc file The issue triggers when the 'tagfunc' closes the window This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash, possibly executing code and corrupting memo ...
A use-after-free vulnerability was found in vim's do_cmdline() function of the src/ex_docmdc file The issue triggers when an invalid line number on :for is ignored This flaw allows an attacker to trick a user into opening a specially crafted file, triggering use-after-free that causes an application to crash, possibly executing code and corrupti ...