CVE-2022-1771
Published on: Not Yet Published
Last Modified on: 05/03/2023 12:15:00 PM UTC
CVE-2022-1771 - advisory for faa74175-5317-4b71-a363-dfc39094ecbb
Source: Mitre Source: NIST CVE.ORG Print: PDF
Certain versions of Vim from Vim contain the following vulnerability:
Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975.
- CVE-2022-1771 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software:
vim - vim/vim version < 8.2.4975
CVSS3 Score: 5.5 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | NONE | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | NONE | HIGH |
CVSS2 Score: 4.3 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | NONE | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Vim, gVim: Multiple Vulnerabilities (GLSA 202208-32) — Gentoo security | security.gentoo.org text/html |
![]() |
Vim, gVim: Multiple Vulnerabilities (GLSA 202305-16) — Gentoo security | security.gentoo.org text/html |
![]() |
patch 8.2.4975: recursive command line loop may cause a crash · vim/[email protected] · GitHub | github.com application/octet-stream |
![]() |
Infinite recursive function calls result in stack overflow vulnerability found in vim | huntr.dev text/html |
![]() |
Related QID Numbers
- 296082 Oracle Solaris 11.4 Support Repository Update (SRU) 48.126.1 Missing (CPUJUL2022)
- 354009 Amazon Linux Security Advisory for vim : ALAS2-2022-1829
- 354033 Amazon Linux Security Advisory for vim : ALAS-2022-1628
- 354356 Amazon Linux Security Advisory for vim : ALAS2022-2022-116
- 354497 Amazon Linux Security Advisory for vim : ALAS2022-2022-155
- 354585 Amazon Linux Security Advisory for vim : ALAS-2022-155
- 355135 Amazon Linux Security Advisory for vim : ALAS2023-2023-098
- 672056 EulerOS Security Update for vim (EulerOS-SA-2022-2263)
- 672072 EulerOS Security Update for vim (EulerOS-SA-2022-2250)
- 672076 EulerOS Security Update for vim (EulerOS-SA-2022-2237)
- 672105 EulerOS Security Update for vim (EulerOS-SA-2022-2307)
- 672124 EulerOS Security Update for vim (EulerOS-SA-2022-2336)
- 710607 Gentoo Linux Vim, gVim Multiple Vulnerabilities (GLSA 202208-32)
- 710718 Gentoo Linux Vim, gVim Multiple Vulnerabilities (GLSA 202305-16)
- 752246 SUSE Enterprise Linux Security Update for vim (SUSE-SU-2022:2102-1)
- 753066 SUSE Enterprise Linux Security Update for vim (SUSE-SU-2022:4619-1)
- 901997 Common Base Linux Mariner (CBL-Mariner) Security Update for vim (9782)
- 902006 Common Base Linux Mariner (CBL-Mariner) Security Update for vim (9789)
- 902191 Common Base Linux Mariner (CBL-Mariner) Security Update for vim (9782-1)
- 902270 Common Base Linux Mariner (CBL-Mariner) Security Update for vim (9789-1)
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Vim | Vim | All | All | All | All |
- cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
Stack-based Buffer Overflow in github.com/vim/vim (CVE-2022-1771) reported by @GreaterGoodest - Patch:… twitter.com/i/web/status/1… | 2022-05-17 22:02:24 |
![]() |
CVE-2022-1771 : Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.... cve.report/CVE-2022-1771 | 2022-05-18 19:20:10 |
![]() |
The vuln CVE-2022-1771 has a tweet created 1 days ago and retweeted 10 times. twitter.com/huntrHacktivit… #pow1rtrtwwcve | 2022-05-18 22:06:00 |
![]() |
CVE-2022-1771 | 2022-05-18 19:38:51 |
![]() |
CVE-2022-1771 tweet | 2022-05-19 19:42:57 |