Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-1968: Use After Free in function utf_ptr2char in vim

Use After Free in GitHub repository vim/vim prior to 8.2.

CVE
#git

Description

Use After Free in function utf_ptr2char at mbyte.c:1794

vim version

git log
commit be99042b03edf7b8156c9adbc23516bfcf2cec0f (HEAD -> master, tag: v8.2.5044, origin/master, origin/HEAD)

POC

./vim -u NONE -i NONE -n -m -X -Z -e -s -S ./poc_huaf2_s.dat -c :qa!
=================================================================
==8341==ERROR: AddressSanitizer: heap-use-after-free on address 0x6020000070f1 at pc 0x000000a46fe9 bp 0x7ffc9d272fe0 sp 0x7ffc9d272fd8
READ of size 1 at 0x6020000070f1 thread T0
    #0 0xa46fe8 in utf_ptr2char /home/fuzz/fuzz/vim/vim/src/mbyte.c:1794:9
    #1 0xd9b882 in nfa_regmatch /home/fuzz/fuzz/vim/vim/src/./regexp_nfa.c:5816:13
    #2 0xd98745 in nfa_regtry /home/fuzz/fuzz/vim/vim/src/./regexp_nfa.c:7205:14
    #3 0xd96437 in nfa_regexec_both /home/fuzz/fuzz/vim/vim/src/./regexp_nfa.c:7400:14
    #4 0xcf85c8 in nfa_regexec_nl /home/fuzz/fuzz/vim/vim/src/./regexp_nfa.c:7580:12
    #5 0xcf4835 in vim_regexec_string /home/fuzz/fuzz/vim/vim/src/regexp.c:2750:14
    #6 0xcf5079 in vim_regexec /home/fuzz/fuzz/vim/vim/src/regexp.c:2816:12
    #7 0xe8ce76 in find_pattern_in_path /home/fuzz/fuzz/vim/vim/src/search.c:3659:8
    #8 0x81ea0f in ex_findpat /home/fuzz/fuzz/vim/vim/src/ex_docmd.c:8869:2
    #9 0x7dd539 in do_one_cmd /home/fuzz/fuzz/vim/vim/src/ex_docmd.c:2568:2
    #10 0x7ca2a5 in do_cmdline /home/fuzz/fuzz/vim/vim/src/ex_docmd.c:992:17
    #11 0xe59ecc in do_source_ext /home/fuzz/fuzz/vim/vim/src/scriptfile.c:1674:5
    #12 0xe56926 in do_source /home/fuzz/fuzz/vim/vim/src/scriptfile.c:1801:12
    #13 0xe5625c in cmd_source /home/fuzz/fuzz/vim/vim/src/scriptfile.c:1174:14
    #14 0xe5593e in ex_source /home/fuzz/fuzz/vim/vim/src/scriptfile.c:1200:2
    #15 0x7dd539 in do_one_cmd /home/fuzz/fuzz/vim/vim/src/ex_docmd.c:2568:2
    #16 0x7ca2a5 in do_cmdline /home/fuzz/fuzz/vim/vim/src/ex_docmd.c:992:17
    #17 0x7cef41 in do_cmdline_cmd /home/fuzz/fuzz/vim/vim/src/ex_docmd.c:586:12
    #18 0x1425eb2 in exe_commands /home/fuzz/fuzz/vim/vim/src/main.c:3106:2
    #19 0x142204b in vim_main2 /home/fuzz/fuzz/vim/vim/src/main.c:780:2
    #20 0x1417745 in main /home/fuzz/fuzz/vim/vim/src/main.c:432:12
    #21 0x7fe8c60f1082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
    #22 0x41ea6d in _start (/home/fuzz/fuzz/vim/vim/src/vim+0x41ea6d)

0x6020000070f1 is located 1 bytes inside of 2-byte region [0x6020000070f0,0x6020000070f2)
freed by thread T0 here:
    #0 0x499a62 in free (/home/fuzz/fuzz/vim/vim/src/vim+0x499a62)
    #1 0x4cbe06 in vim_free /home/fuzz/fuzz/vim/vim/src/alloc.c:621:2
    #2 0xa65e45 in ml_flush_line /home/fuzz/fuzz/vim/vim/src/memline.c:4063:2
    #3 0xa7b645 in ml_get_buf /home/fuzz/fuzz/vim/vim/src/memline.c:2651:2
    #4 0xa7bdf6 in ml_get_pos /home/fuzz/fuzz/vim/vim/src/memline.c:2573:13
    #5 0xaad44d in gchar_pos /home/fuzz/fuzz/vim/vim/src/misc1.c:521:11
    #6 0x10ab5e0 in findsent /home/fuzz/fuzz/vim/vim/src/textobject.c:101:10
    #7 0xa1c3be in getmark_buf_fnum /home/fuzz/fuzz/vim/vim/src/mark.c:354:6
    #8 0xa1b989 in getmark_buf /home/fuzz/fuzz/vim/vim/src/mark.c:287:12
    #9 0xda7f3a in nfa_regmatch /home/fuzz/fuzz/vim/vim/src/./regexp_nfa.c:6803:9
    #10 0xd98745 in nfa_regtry /home/fuzz/fuzz/vim/vim/src/./regexp_nfa.c:7205:14
    #11 0xd96437 in nfa_regexec_both /home/fuzz/fuzz/vim/vim/src/./regexp_nfa.c:7400:14
    #12 0xcf85c8 in nfa_regexec_nl /home/fuzz/fuzz/vim/vim/src/./regexp_nfa.c:7580:12
    #13 0xcf4835 in vim_regexec_string /home/fuzz/fuzz/vim/vim/src/regexp.c:2750:14
    #14 0xcf5079 in vim_regexec /home/fuzz/fuzz/vim/vim/src/regexp.c:2816:12
    #15 0xe8ce76 in find_pattern_in_path /home/fuzz/fuzz/vim/vim/src/search.c:3659:8
    #16 0x81ea0f in ex_findpat /home/fuzz/fuzz/vim/vim/src/ex_docmd.c:8869:2
    #17 0x7dd539 in do_one_cmd /home/fuzz/fuzz/vim/vim/src/ex_docmd.c:2568:2
    #18 0x7ca2a5 in do_cmdline /home/fuzz/fuzz/vim/vim/src/ex_docmd.c:992:17
    #19 0xe59ecc in do_source_ext /home/fuzz/fuzz/vim/vim/src/scriptfile.c:1674:5
    #20 0xe56926 in do_source /home/fuzz/fuzz/vim/vim/src/scriptfile.c:1801:12
    #21 0xe5625c in cmd_source /home/fuzz/fuzz/vim/vim/src/scriptfile.c:1174:14
    #22 0xe5593e in ex_source /home/fuzz/fuzz/vim/vim/src/scriptfile.c:1200:2
    #23 0x7dd539 in do_one_cmd /home/fuzz/fuzz/vim/vim/src/ex_docmd.c:2568:2
    #24 0x7ca2a5 in do_cmdline /home/fuzz/fuzz/vim/vim/src/ex_docmd.c:992:17
    #25 0x7cef41 in do_cmdline_cmd /home/fuzz/fuzz/vim/vim/src/ex_docmd.c:586:12
    #26 0x1425eb2 in exe_commands /home/fuzz/fuzz/vim/vim/src/main.c:3106:2
    #27 0x142204b in vim_main2 /home/fuzz/fuzz/vim/vim/src/main.c:780:2
    #28 0x1417745 in main /home/fuzz/fuzz/vim/vim/src/main.c:432:12
    #29 0x7fe8c60f1082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16

previously allocated by thread T0 here:
    #0 0x499ccd in malloc (/home/fuzz/fuzz/vim/vim/src/vim+0x499ccd)
    #1 0x4cb3aa in lalloc /home/fuzz/fuzz/vim/vim/src/alloc.c:246:11
    #2 0x4cb28a in alloc /home/fuzz/fuzz/vim/vim/src/alloc.c:151:12
    #3 0x54d5ed in ins_char_bytes /home/fuzz/fuzz/vim/vim/src/change.c:1095:12
    #4 0x54e2cb in ins_char /home/fuzz/fuzz/vim/vim/src/change.c:1010:5
    #5 0x69714f in insertchar /home/fuzz/fuzz/vim/vim/src/edit.c:2276:6
    #6 0x68f1e9 in insert_special /home/fuzz/fuzz/vim/vim/src/edit.c:2039:2
    #7 0x6749d2 in edit /home/fuzz/fuzz/vim/vim/src/edit.c:1360:3
    #8 0xb98bd7 in op_change /home/fuzz/fuzz/vim/vim/src/ops.c:1752:14
    #9 0xbb2867 in do_pending_operator /home/fuzz/fuzz/vim/vim/src/ops.c:4035:7
    #10 0xb21fc3 in normal_cmd /home/fuzz/fuzz/vim/vim/src/normal.c:963:2
    #11 0x8153ae in exec_normal /home/fuzz/fuzz/vim/vim/src/ex_docmd.c:8792:6
    #12 0x814bd8 in exec_normal_cmd /home/fuzz/fuzz/vim/vim/src/ex_docmd.c:8755:5
    #13 0x814789 in ex_normal /home/fuzz/fuzz/vim/vim/src/ex_docmd.c:8673:6
    #14 0x7dd539 in do_one_cmd /home/fuzz/fuzz/vim/vim/src/ex_docmd.c:2568:2
    #15 0x7ca2a5 in do_cmdline /home/fuzz/fuzz/vim/vim/src/ex_docmd.c:992:17
    #16 0xe59ecc in do_source_ext /home/fuzz/fuzz/vim/vim/src/scriptfile.c:1674:5
    #17 0xe56926 in do_source /home/fuzz/fuzz/vim/vim/src/scriptfile.c:1801:12
    #18 0xe5625c in cmd_source /home/fuzz/fuzz/vim/vim/src/scriptfile.c:1174:14
    #19 0xe5593e in ex_source /home/fuzz/fuzz/vim/vim/src/scriptfile.c:1200:2
    #20 0x7dd539 in do_one_cmd /home/fuzz/fuzz/vim/vim/src/ex_docmd.c:2568:2
    #21 0x7ca2a5 in do_cmdline /home/fuzz/fuzz/vim/vim/src/ex_docmd.c:992:17
    #22 0x7cef41 in do_cmdline_cmd /home/fuzz/fuzz/vim/vim/src/ex_docmd.c:586:12
    #23 0x1425eb2 in exe_commands /home/fuzz/fuzz/vim/vim/src/main.c:3106:2
    #24 0x142204b in vim_main2 /home/fuzz/fuzz/vim/vim/src/main.c:780:2
    #25 0x1417745 in main /home/fuzz/fuzz/vim/vim/src/main.c:432:12
    #26 0x7fe8c60f1082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16

SUMMARY: AddressSanitizer: heap-use-after-free /home/fuzz/fuzz/vim/vim/src/mbyte.c:1794:9 in utf_ptr2char
Shadow bytes around the buggy address:
  0x0c047fff8dc0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fa
  0x0c047fff8dd0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa
  0x0c047fff8de0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa
  0x0c047fff8df0: fa fa fd fa fa fa fd fa fa fa 02 fa fa fa 02 fa
  0x0c047fff8e00: fa fa 00 fa fa fa 01 fa fa fa 01 fa fa fa 00 00
=>0x0c047fff8e10: fa fa 01 fa fa fa 02 fa fa fa fd fa fa fa[fd]fa
  0x0c047fff8e20: fa fa 05 fa fa fa fd fd fa fa 00 01 fa fa 00 00
  0x0c047fff8e30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c047fff8e40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c047fff8e50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c047fff8e60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07
  Heap left redzone:       fa
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  Array cookie:            ac
  Intra object redzone:    bb
  ASan internal:           fe
  Left alloca redzone:     ca
  Right alloca redzone:    cb
  Shadow gap:              cc
==8341==ABORTING

poc_huaf2_s.dat

Impact

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

Related news

Gentoo Linux Security Advisory 202305-16

Gentoo Linux Security Advisory 202305-16 - Multiple vulnerabilities have been found in Vim, the worst of which could result in denial of service. Versions less than 9.0.1157 are affected.

Ubuntu Security Notice USN-5995-1

Ubuntu Security Notice 5995-1 - It was discovered that Vim incorrectly handled memory when opening certain files. If an attacker could trick a user into opening a specially crafted file, it could cause Vim to crash, or possible execute arbitrary code. This issue only affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.

CVE-2022-46756: DSA-2022-335: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities

Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.

Scanvus now supports Vulners and Vulns.io VM Linux vulnerability detection APIs

Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]

CVE-2022-26730: About the security content of macOS Ventura 13

A memory corruption issue existed in the processing of ICC profiles. This issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13. Processing a maliciously crafted image may lead to arbitrary code execution.

Gentoo Linux Security Advisory 202208-32

Gentoo Linux Security Advisory 202208-32 - Multiple vulnerabilities have been discovered in Vim, the worst of which could result in denial of service. Versions less than 9.0.0060 are affected.

Ubuntu Security Notice USN-5507-1

Ubuntu Security Notice 5507-1 - It was discovered that Vim incorrectly handled memory access. An attacker could potentially use this issue to cause the program to crash, use unexpected values, or execute arbitrary code. It was discovered that Vim incorrectly handled memory access. An attacker could potentially use this issue to cause the corruption of sensitive information, a crash, or arbitrary code execution.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907