
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-4192 is a Use After Free vulnerability discovered in vim text editor. The vulnerability was disclosed on December 31, 2021, affecting vim versions up to 8.2.3949. The issue was found in the win_linetabsize() functionality (NVD, Debian).
The vulnerability is classified as a Use After Free issue with a CVSS v3.1 base score of 7.8 (HIGH) with vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. The issue occurs in the win_linetabsize() function where memory is accessed after being freed, potentially leading to arbitrary code execution (NVD, Huntr).
The vulnerability could allow an attacker to cause unexpected application termination or potentially execute arbitrary code. The issue requires user interaction to exploit, as it involves processing specially crafted input (NVD).
The vulnerability was patched in vim version 8.2.3949 with a fix that improves memory handling. The patch involves getting the line again after getvvcol() to prevent the use-after-free condition (Vim Patch). Multiple operating system vendors have released security updates including Apple, Debian, and Fedora (Apple Security, Debian LTS, Fedora).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."