
Cloud Vulnerability DB
A community-led vulnerabilities database
Out-of-bounds Read vulnerability (CVE-2022-2581) was discovered in GitHub repository vim/vim prior to version 9.0.0104. The vulnerability was disclosed on August 1, 2022, and affects multiple versions of the Vim text editor. This security issue impacts various Linux distributions including Ubuntu, Debian, and other systems running affected Vim versions (NVD, CVE).
The vulnerability is classified as an Out-of-bounds Read (CWE-125) with a CVSS v3.1 Base Score of 7.8 (High). The attack vector is Local, requiring low attack complexity and no privileges, but does need user interaction. The vulnerability affects confidentiality, integrity, and availability, all with high impact ratings. The CVSS vector string is CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (NVD).
If exploited, this vulnerability could allow an attacker to cause Vim to crash or potentially execute arbitrary code when opening specially crafted files. The vulnerability affects multiple aspects of security with high impact ratings for confidentiality, integrity, and availability (Ubuntu).
The vulnerability has been fixed in Vim version 9.0.0104 and later. Users are advised to update their Vim installations to the patched version. For Ubuntu users, specific package versions have been released to address this vulnerability: Ubuntu 22.04 LTS (2:8.2.3995-1ubuntu2.5), Ubuntu 20.04 LTS (2:8.1.2269-1ubuntu5.13), and Ubuntu 18.04 LTS (2:8.0.1453-1ubuntu1.12) (Ubuntu).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."