ID

VAR-202202-0008


CVE

CVE-2022-0696


TITLE

vim/vim  In  NULL  Pointer dereference vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2022-006017

DESCRIPTION

NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4428. vim/vim for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. ========================================================================== Ubuntu Security Notice USN-6195-1 July 03, 2023 vim vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS Summary: Several security issues were fixed in Vim. Software Description: - vim: Vi IMproved - enhanced vi editor Details: It was discovered that Vim contained an out-of-bounds read vulnerability. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2022-0128) It was discovered that Vim did not properly manage memory when freeing allocated memory. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2022-0156) It was discovered that Vim contained a heap-based buffer overflow vulnerability. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2022-0158) It was discovered that Vim did not properly manage memory when recording and using select mode. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-0393) It was discovered that Vim incorrectly handled certain memory operations during a visual block yank. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. An attacker could possible use this issue to cause a denial of service. (CVE-2022-0696) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: vim 2:8.2.3995-1ubuntu2.9 vim-athena 2:8.2.3995-1ubuntu2.9 vim-gtk3 2:8.2.3995-1ubuntu2.9 vim-nox 2:8.2.3995-1ubuntu2.9 vim-tiny 2:8.2.3995-1ubuntu2.9 xxd 2:8.2.3995-1ubuntu2.9 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-6195-1 CVE-2022-0128, CVE-2022-0156, CVE-2022-0158, CVE-2022-0393, CVE-2022-0407, CVE-2022-0696 Package Information: https://launchpad.net/ubuntu/+source/vim/2:8.2.3995-1ubuntu2.9

Trust: 1.89

sources: NVD: CVE-2022-0696 // JVNDB: JVNDB-2022-006017 // VULHUB: VHN-415375 // VULMON: CVE-2022-0696 // PACKETSTORM: 173275

AFFECTED PRODUCTS

vendor:fedoraprojectmodel:fedorascope:eqversion:34

Trust: 1.0

vendor:applemodel:macosscope:ltversion:13.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:vimmodel:vimscope:ltversion:8.2.4428

Trust: 1.0

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

vendor:アップルmodel:macosscope: - version: -

Trust: 0.8

vendor:vimmodel:vimscope: - version: -

Trust: 0.8

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-006017 // NVD: CVE-2022-0696

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-0696
value: MEDIUM

Trust: 1.0

security@huntr.dev: CVE-2022-0696
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-0696
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202202-1716
value: MEDIUM

Trust: 0.6

VULHUB: VHN-415375
value: MEDIUM

Trust: 0.1

VULMON: CVE-2022-0696
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2022-0696
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-415375
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2022-0696
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

security@huntr.dev: CVE-2022-0696
baseSeverity: MEDIUM
baseScore: 6.2
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.5
impactScore: 3.6
version: 3.0

Trust: 1.0

NVD: CVE-2022-0696
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-415375 // VULMON: CVE-2022-0696 // JVNDB: JVNDB-2022-006017 // CNNVD: CNNVD-202202-1716 // NVD: CVE-2022-0696 // NVD: CVE-2022-0696

PROBLEMTYPE DATA

problemtype:CWE-476

Trust: 1.1

problemtype:NULL Pointer dereference (CWE-476) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-415375 // JVNDB: JVNDB-2022-006017 // NVD: CVE-2022-0696

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202202-1716

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202202-1716

PATCH

title:HT213488url:https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html

Trust: 0.8

title:Vim Fixes for code issue vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=184791

Trust: 0.6

title:Amazon Linux 2: ALAS2-2022-1771url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2022-1771

Trust: 0.1

title:Amazon Linux AMI: ALAS-2022-1579url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2022-1579

Trust: 0.1

sources: VULMON: CVE-2022-0696 // JVNDB: JVNDB-2022-006017 // CNNVD: CNNVD-202202-1716

EXTERNAL IDS

db:NVDid:CVE-2022-0696

Trust: 3.5

db:JVNDBid:JVNDB-2022-006017

Trust: 0.8

db:CS-HELPid:SB2022022221

Trust: 0.6

db:CS-HELPid:SB2022062022

Trust: 0.6

db:AUSCERTid:ESB-2022.3002

Trust: 0.6

db:AUSCERTid:ESB-2023.3782

Trust: 0.6

db:AUSCERTid:ESB-2022.5300

Trust: 0.6

db:AUSCERTid:ESB-2023.0019

Trust: 0.6

db:AUSCERTid:ESB-2022.6148

Trust: 0.6

db:CNNVDid:CNNVD-202202-1716

Trust: 0.6

db:VULHUBid:VHN-415375

Trust: 0.1

db:VULMONid:CVE-2022-0696

Trust: 0.1

db:PACKETSTORMid:173275

Trust: 0.1

sources: VULHUB: VHN-415375 // VULMON: CVE-2022-0696 // JVNDB: JVNDB-2022-006017 // PACKETSTORM: 173275 // CNNVD: CNNVD-202202-1716 // NVD: CVE-2022-0696

REFERENCES

url:http://seclists.org/fulldisclosure/2022/oct/41

Trust: 2.5

url:https://huntr.dev/bounties/7416c2cb-1809-4834-8989-e84ff033f15f

Trust: 1.8

url:https://github.com/vim/vim/commit/0f6e28f686dbb59ab3b562408ab9b2234797b9b1

Trust: 1.8

url:https://support.apple.com/kb/ht213488

Trust: 1.7

url:http://seclists.org/fulldisclosure/2022/oct/28

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html

Trust: 1.7

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7zlehvp4lnager4zdguds5v5yvqd6inf/

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2022-0696

Trust: 0.9

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7zlehvp4lnager4zdguds5v5yvqd6inf/

Trust: 0.8

url:https://vigilance.fr/vulnerability/vim-null-pointer-dereference-via-get-user-var-name-37654

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022022221

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.0019

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022062022

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.5300

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.6148

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-0696/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3002

Trust: 0.6

url:https://support.apple.com/en-us/ht213488

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2022-0696

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3782

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/476.html

Trust: 0.2

url:https://nvd.nist.gov

Trust: 0.1

url:https://alas.aws.amazon.com/al2/alas-2022-1771.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0393

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0158

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/vim/2:8.2.3995-1ubuntu2.9

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0407

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6195-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0156

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0128

Trust: 0.1

sources: VULHUB: VHN-415375 // VULMON: CVE-2022-0696 // JVNDB: JVNDB-2022-006017 // PACKETSTORM: 173275 // CNNVD: CNNVD-202202-1716 // NVD: CVE-2022-0696

CREDITS

Ubuntu

Trust: 0.1

sources: PACKETSTORM: 173275

SOURCES

db:VULHUBid:VHN-415375
db:VULMONid:CVE-2022-0696
db:JVNDBid:JVNDB-2022-006017
db:PACKETSTORMid:173275
db:CNNVDid:CNNVD-202202-1716
db:NVDid:CVE-2022-0696

LAST UPDATE DATE

2024-08-14T12:55:27.321000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-415375date:2022-11-29T00:00:00
db:VULMONid:CVE-2022-0696date:2022-03-01T00:00:00
db:JVNDBid:JVNDB-2022-006017date:2023-06-26T02:46:00
db:CNNVDid:CNNVD-202202-1716date:2023-07-04T00:00:00
db:NVDid:CVE-2022-0696date:2023-11-07T03:41:29.990

SOURCES RELEASE DATE

db:VULHUBid:VHN-415375date:2022-02-21T00:00:00
db:VULMONid:CVE-2022-0696date:2022-02-21T00:00:00
db:JVNDBid:JVNDB-2022-006017date:2023-06-26T00:00:00
db:PACKETSTORMid:173275date:2023-07-04T01:10:12
db:CNNVDid:CNNVD-202202-1716date:2022-02-21T00:00:00
db:NVDid:CVE-2022-0696date:2022-02-21T20:15:08.230