CVE-2021-4166

Published: Dic 25, 2021 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2021-34032 Aliases: GSD-2021-4166
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,1
Attack Vector: local
Attack Complexity: low
Privileges Required: none
User Interaction: required
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: high
MEDIUM 5,8
Access Vector: network
Access Complexity: medium
Authentication: none
Confidentiality: partial
Integrity: none
Availability: partial

Description

AI Translation Available

vim is vulnerable to Out-of-bounds Read

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0022
Percentile
0,4th
Updated

EPSS Score Trend (Last 90 Days)

125

Out-of-bounds Read

Draft
Common Consequences
Security Scopes Affected:
Confidentiality Availability Other
Potential Impacts:
Read Memory Bypass Protection Mechanism Dos: Crash, Exit, Or Restart Varies By Context
Applicable Platforms
Languages: C, C++, Memory-Unsafe
Technologies: ICS/OT
View CWE Details
Operating System

Mac Os X by Apple

cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Debian Linux by Debian

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Macos by Apple

Version Range Affected
From 11.0 (inclusive)
To 11.6.6 (exclusive)
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Mac Os X by Apple

cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Mac Os X by Apple

cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Linux Enterprise by Suse

cpe:2.3:o:suse:linux_enterprise:15.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Mac Os X by Apple

cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Mac Os X by Apple

cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Mac Os X by Apple

cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Mac Os X by Apple

cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Fedora by Fedoraproject

cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Mac Os X by Apple

cpe:2.3:o:apple:mac_os_x:10.15.7:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Mac Os X by Apple

cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Macos by Apple

Version Range Affected
To 12.3 (exclusive)
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Mac Os X by Apple

cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Fedora by Fedoraproject

cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Linux Enterprise by Suse

cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Mac Os X by Apple

cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Mac Os X by Apple

cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Macos by Apple

cpe:2.3:o:apple:macos:10.15.7:security_update_2022-004:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Debian Linux by Debian

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Factory by Opensuse

cpe:2.3:a:opensuse:factory:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Mac Os X by Apple

cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Enterprise Linux by Redhat

cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Debian Linux by Debian

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Vim by Vim

Version Range Affected
To 8.2.3884 (exclusive)
cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
http://seclists.org/fulldisclosure/2022/Jul/14
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Jul/14
http://seclists.org/fulldisclosure/2022/Mar/29
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/May/35
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bd…
Exploit Issue Tracking Patch Third Party Advisory
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…
https://security.gentoo.org/glsa/202208-32
https://support.apple.com/kb/HT213183
Release Notes Third Party Advisory
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213343
http://www.openwall.com/lists/oss-security/2022/01/15/1
http://seclists.org/fulldisclosure/2022/Jul/14
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Jul/14
http://seclists.org/fulldisclosure/2022/Mar/29
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/May/35
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bd…
Exploit Issue Tracking Patch Third Party Advisory
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…
https://security.gentoo.org/glsa/202208-32
https://support.apple.com/kb/HT213183
Release Notes Third Party Advisory
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213343
http://www.openwall.com/lists/oss-security/2022/01/15/1