Vim < 9.0.2068 Use After Free

medium Nessus Plugin ID 184197

Synopsis

A text editor installed on the remote Windows host is affected a use after free vulnerability.

Description

Vim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function `ga_grow_inner` in in the file `src/alloc.c` at line 748, which is freed in the file `src/ex_docmd.c` in the function `do_cmdline` at line 1010 and then used again in `src/cmdhist.c` at line 759. When using the `:history` command, it's possible that the provided argument overflows the accepted value. Causing an Integer Overflow and potentially later an use-after-free.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Vim version 9.0.2068 or later

See Also

https://github.com/vim/vim/security/advisories/GHSA-q22m-h7m2-9mgm

Plugin Details

Severity: Medium

ID: 184197

File Name: vim_9_0_2068.nasl

Version: 1.5

Type: local

Agent: windows

Family: Windows

Published: 11/2/2023

Updated: 12/8/2023

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

CVSS Score Source: CVE-2023-46246

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:vim:vim

Required KB Items: SMB/Registry/Enumerated, installed_sw/Vim

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/27/2023

Vulnerability Publication Date: 10/27/2023

Reference Information

CVE: CVE-2023-46246

IAVA: 2023-A-0598-S