{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3770","assignerOrgId":"c09c270a-b464-47c1-9133-acb35b22c19a","assignerShortName":"@huntrdev","dateUpdated":"2024-08-03T17:09:08.768Z","dateReserved":"2021-09-05T00:00:00.000Z","datePublished":"2021-09-06T00:00:00.000Z"},"containers":{"cna":{"title":"Heap-based Buffer Overflow in vim/vim","providerMetadata":{"orgId":"c09c270a-b464-47c1-9133-acb35b22c19a","shortName":"@huntrdev","dateUpdated":"2022-11-24T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"vim is vulnerable to Heap-based Buffer Overflow"}],"affected":[{"vendor":"vim","product":"vim/vim","versions":[{"version":"unspecified","lessThan":"8.2.3403","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365"},{"url":"https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9"},{"name":"FEDORA-2021-5fa81a2b04","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/"},{"name":"FEDORA-2021-4a43cbe0b4","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/"},{"name":"FEDORA-2021-e982f972f2","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/"},{"name":"[oss-security] 20210930 3 new CVE's in vim","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2021/10/01/1"},{"name":"GLSA-202208-32","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202208-32"},{"url":"https://security.netapp.com/advisory/ntap-20221124-0003/"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.6,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-122 Heap-based Buffer Overflow","cweId":"CWE-122"}]}],"source":{"advisory":"016ad2f2-07c1-4d14-a8ce-6eed10729365","discovery":"EXTERNAL"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T17:09:08.768Z"},"title":"CVE Program Container","references":[{"url":"https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365","tags":["x_transferred"]},{"url":"https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9","tags":["x_transferred"]},{"name":"FEDORA-2021-5fa81a2b04","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/"},{"name":"FEDORA-2021-4a43cbe0b4","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/"},{"name":"FEDORA-2021-e982f972f2","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/"},{"name":"[oss-security] 20210930 3 new CVE's in vim","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2021/10/01/1"},{"name":"GLSA-202208-32","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202208-32"},{"url":"https://security.netapp.com/advisory/ntap-20221124-0003/","tags":["x_transferred"]}]}]}}