
Cloud Vulnerability DB
A community-led vulnerabilities database
A heap-based buffer overflow vulnerability was discovered in Vim prior to version 8.2. The vulnerability (CVE-2022-0392) was identified on January 27, 2022, and affects the bracketed paste functionality when used in Ex mode (Vim Commit, NVD).
The vulnerability occurs due to illegal memory access with bracketed paste in Ex mode. The issue stems from insufficient space reservation for the trailing NUL character when processing pasted content. This was fixed by modifying the code to properly account for the additional byte needed for the NUL terminator (Vim Commit).
The heap-based buffer overflow could potentially lead to arbitrary code execution, memory corruption, or application crashes when processing maliciously crafted input in Ex mode (Debian LTS).
The vulnerability was patched in Vim version 8.2.4218. Users are advised to upgrade to this version or later. Multiple distributions have released security updates including Debian, Ubuntu, and Apple macOS that address this vulnerability (Debian LTS, Apple Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."