Risk | High |
Patch available | YES |
Number of vulnerabilities | 6 |
CVE-ID | CVE-2022-0128 CVE-2022-0156 CVE-2022-0158 CVE-2022-0393 CVE-2022-0407 CVE-2022-0696 |
CWE-ID | CWE-125 CWE-416 CWE-122 CWE-476 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Ubuntu Operating systems & Components / Operating system vim-nox (Ubuntu package) Operating systems & Components / Operating system package or component vim-gtk3 (Ubuntu package) Operating systems & Components / Operating system package or component vim-tiny (Ubuntu package) Operating systems & Components / Operating system package or component vim (Ubuntu package) Operating systems & Components / Operating system package or component xxd (Ubuntu package) Operating systems & Components / Operating system package or component vim-athena (Ubuntu package) Operating systems & Components / Operating system package or component |
Vendor | Canonical Ltd. |
Security Bulletin
This security bulletin contains information about 6 vulnerabilities.
EUVDB-ID: #VU60788
Risk: Low
CVSSv4.0: 0.2 [CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-0128
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to crash the application.
The vulnerability exists due to a boundary condition. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and crash the application.
MitigationUpdate the affected package vim to the latest version.
Vulnerable software versionsUbuntu: 22.04
vim-nox (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim-gtk3 (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim-tiny (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
xxd (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim-athena (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
CPE2.3https://ubuntu.com/security/notices/USN-6195-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU60766
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-0156
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing lines inside files. A remote attacker can trick the victim to open a specially crafted file, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate the affected package vim to the latest version.
Vulnerable software versionsUbuntu: 22.04
vim-nox (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim-gtk3 (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim-tiny (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
xxd (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim-athena (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
CPE2.3https://ubuntu.com/security/notices/USN-6195-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU60767
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-0158
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing lines that start with the "$" character. A remote attacker can trick the victim to open a specially crafted file, trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package vim to the latest version.
Vulnerable software versionsUbuntu: 22.04
vim-nox (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim-gtk3 (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim-tiny (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
xxd (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim-athena (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
CPE2.3https://ubuntu.com/security/notices/USN-6195-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU60784
Risk: Low
CVSSv4.0: 0.2 [CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-0393
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to crash the application.
The vulnerability exists due to a boundary condition when recording and using Select mode . A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and crash the application.
Update the affected package vim to the latest version.
Vulnerable software versionsUbuntu: 22.04
vim-nox (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim-gtk3 (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim-tiny (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
xxd (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim-athena (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
CPE2.3https://ubuntu.com/security/notices/USN-6195-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU60782
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-0407
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote attacker can trick the victim to open a specially crafted file, trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package vim to the latest version.
Vulnerable software versionsUbuntu: 22.04
vim-nox (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim-gtk3 (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim-tiny (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
xxd (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim-athena (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
CPE2.3https://ubuntu.com/security/notices/USN-6195-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU60773
Risk: Low
CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-0696
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in Vim when switching tabpage while in the cmdline window. A remote attacker can perform a denial of service (DoS) attack.
MitigationUpdate the affected package vim to the latest version.
Vulnerable software versionsUbuntu: 22.04
vim-nox (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim-gtk3 (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim-tiny (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
xxd (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
vim-athena (Ubuntu package): before 2:8.2.3995-1ubuntu2.9
CPE2.3https://ubuntu.com/security/notices/USN-6195-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.