CVE-2022-1619

Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution
References
Link Resource
http://seclists.org/fulldisclosure/2022/Oct/28 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Oct/41 Mailing List Third Party Advisory
https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe Patch Third Party Advisory
https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450 Exploit Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://security.gentoo.org/glsa/202208-32 Third Party Advisory
https://security.gentoo.org/glsa/202305-16
https://security.netapp.com/advisory/ntap-20220930-0007/ Third Party Advisory
https://support.apple.com/kb/HT213488 Vendor Advisory
http://seclists.org/fulldisclosure/2022/Oct/28 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Oct/41 Mailing List Third Party Advisory
https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe Patch Third Party Advisory
https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450 Exploit Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://security.gentoo.org/glsa/202208-32 Third Party Advisory
https://security.gentoo.org/glsa/202305-16
https://security.netapp.com/advisory/ntap-20220930-0007/ Third Party Advisory
https://support.apple.com/kb/HT213488 Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:41

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2022/Oct/28 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2022/Oct/28 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2022/Oct/41 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2022/Oct/41 - Mailing List, Third Party Advisory
References () https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe - Patch, Third Party Advisory () https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe - Patch, Third Party Advisory
References () https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450 - Exploit, Third Party Advisory () https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450 - Exploit, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/ -
References () https://security.gentoo.org/glsa/202208-32 - Third Party Advisory () https://security.gentoo.org/glsa/202208-32 - Third Party Advisory
References () https://security.gentoo.org/glsa/202305-16 - () https://security.gentoo.org/glsa/202305-16 -
References () https://security.netapp.com/advisory/ntap-20220930-0007/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20220930-0007/ - Third Party Advisory
References () https://support.apple.com/kb/HT213488 - Vendor Advisory () https://support.apple.com/kb/HT213488 - Vendor Advisory

07 Nov 2023, 03:42

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/', 'name': 'FEDORA-2022-8df66cdbef', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/', 'name': 'FEDORA-2022-e92c3ce170', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/', 'name': 'FEDORA-2022-f0db3943d9', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/ -

Information

Published : 2022-05-08 10:15

Updated : 2024-11-21 06:41


NVD link : CVE-2022-1619

Mitre link : CVE-2022-1619

CVE.ORG link : CVE-2022-1619


JSON object : View

Products Affected

apple

  • macos

netapp

  • hci_management_node
  • solidfire

debian

  • debian_linux

fedoraproject

  • fedora

vim

  • vim
CWE
CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write