Severity
7.8HIGHNVD
EPSS
0.1%
top 74.91%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 7
Latest updateOct 24

Description

Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDvim/vim< 8.2.4895
CVEListV5vim/vim_vimunspecified8.2.4895
NVDapple/macos< 13.0
Debianvim/vim< 2:8.2.2434-3+deb11u2+3

Also affects: Debian Linux 10.0, 9.0, Fedora 34, 35, 36

Patches

🔴Vulnerability Details

3
GHSA
GHSA-9xqg-wjcv-qqxq: Use after free in append_command in GitHub repository vim/vim prior to 82022-05-08
CVEList
Use after free in append_command in vim/vim2022-05-07
OSV
CVE-2022-1616: Use after free in append_command in GitHub repository vim/vim prior to 82022-05-07

📋Vendor Advisories

7
Apple
CVE-2022-1616: macOS Ventura 132022-10-24
Ubuntu
Vim regression2022-09-19
Ubuntu
Vim vulnerabilities2022-09-15
Ubuntu
Vim vulnerabilities2022-06-06
Microsoft
Use after free in append_command in vim/vim2022-05-10
CVE-2022-1616 — Use After Free in VIM VIM | cvebase