According to the versions of the vim packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities :
vim is vulnerable to Heap-based Buffer Overflow (CVE-2021-3778, CVE-2021-3872, CVE-2021-3927, CVE-2021-3984, CVE-2021-4019, CVE-2022-0213)
vim is vulnerable to Use After Free (CVE-2021-3796, CVE-2021-3974, CVE-2021-4069, CVE-2021-4192)
vim is vulnerable to Use of Uninitialized Variable (CVE-2021-3928)
vim is vulnerable to Out-of-bounds Read (CVE-2021-4193)
Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.
(CVE-2022-0351)
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. (CVE-2022-0359, CVE-2022-1942, CVE-2022-2125, CVE-2022-2207)
Use After Free in GitHub repository vim/vim prior to 8.2. (CVE-2022-0413, CVE-2022-0443, CVE-2022-1898, CVE-2022-1968, CVE-2022-2042)
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4436. (CVE-2022-0714)
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440. (CVE-2022-0729)
Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563. (CVE-2022-0943)
Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646. (CVE-2022-1154)
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input. (CVE-2022-1620)
Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution (CVE-2022-1621)
Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution (CVE-2022-1629)
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application crash) via a crafted input. (CVE-2022-1674)
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968. (CVE-2022-1733)
Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969. (CVE-2022-1735)
Use After Free in GitHub repository vim/vim prior to 8.2.4979. (CVE-2022-1796)
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. (CVE-2022-1851, CVE-2022-2126, CVE-2022-2183, CVE-2022-2206)
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. (CVE-2022-1897, CVE-2022-2000, CVE-2022-2210)
Buffer Over-read in GitHub repository vim/vim prior to 8.2. (CVE-2022-2124)
NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163. (CVE-2022-2208)
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0. (CVE-2022-2257, CVE-2022-2287)
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0. (CVE-2022-2284)
Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0. (CVE-2022-2285)
Use After Free in GitHub repository vim/vim prior to 9.0. (CVE-2022-2289)
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0. (CVE-2022-2304)
Use After Free in GitHub repository vim/vim prior to 9.0.0046. (CVE-2022-2345)
Improper Validation of Specified Quantity in Input in GitHub repository vim/vim prior to 9.0.0218.
(CVE-2022-2845)
Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(170811);
script_version("1.2");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/01/16");
script_cve_id(
"CVE-2021-3778",
"CVE-2021-3796",
"CVE-2021-3872",
"CVE-2021-3927",
"CVE-2021-3928",
"CVE-2021-3974",
"CVE-2021-3984",
"CVE-2021-4019",
"CVE-2021-4069",
"CVE-2021-4192",
"CVE-2021-4193",
"CVE-2022-0213",
"CVE-2022-0351",
"CVE-2022-0359",
"CVE-2022-0413",
"CVE-2022-0443",
"CVE-2022-0714",
"CVE-2022-0729",
"CVE-2022-0943",
"CVE-2022-1154",
"CVE-2022-1620",
"CVE-2022-1621",
"CVE-2022-1629",
"CVE-2022-1674",
"CVE-2022-1733",
"CVE-2022-1735",
"CVE-2022-1796",
"CVE-2022-1851",
"CVE-2022-1897",
"CVE-2022-1898",
"CVE-2022-1942",
"CVE-2022-1968",
"CVE-2022-2000",
"CVE-2022-2042",
"CVE-2022-2124",
"CVE-2022-2125",
"CVE-2022-2126",
"CVE-2022-2183",
"CVE-2022-2206",
"CVE-2022-2207",
"CVE-2022-2208",
"CVE-2022-2210",
"CVE-2022-2257",
"CVE-2022-2284",
"CVE-2022-2285",
"CVE-2022-2287",
"CVE-2022-2289",
"CVE-2022-2304",
"CVE-2022-2345",
"CVE-2022-2845"
);
script_name(english:"EulerOS Virtualization 3.0.2.2 : vim (EulerOS-SA-2023-1303)");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS Virtualization host is missing multiple security updates.");
script_set_attribute(attribute:"description", value:
"According to the versions of the vim packages installed, the EulerOS Virtualization installation on the remote host is
affected by the following vulnerabilities :
- vim is vulnerable to Heap-based Buffer Overflow (CVE-2021-3778, CVE-2021-3872, CVE-2021-3927,
CVE-2021-3984, CVE-2021-4019, CVE-2022-0213)
- vim is vulnerable to Use After Free (CVE-2021-3796, CVE-2021-3974, CVE-2021-4069, CVE-2021-4192)
- vim is vulnerable to Use of Uninitialized Variable (CVE-2021-3928)
- vim is vulnerable to Out-of-bounds Read (CVE-2021-4193)
- Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.
(CVE-2022-0351)
- Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. (CVE-2022-0359, CVE-2022-1942,
CVE-2022-2125, CVE-2022-2207)
- Use After Free in GitHub repository vim/vim prior to 8.2. (CVE-2022-0413, CVE-2022-0443, CVE-2022-1898,
CVE-2022-1968, CVE-2022-2042)
- Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4436. (CVE-2022-0714)
- Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440. (CVE-2022-0729)
- Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563. (CVE-2022-0943)
- Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646. (CVE-2022-1154)
- NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim
prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows
attackers to cause a denial of service (application crash) via a crafted input. (CVE-2022-1620)
- Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This
vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible
remote execution (CVE-2022-1621)
- Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This
vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution
(CVE-2022-1629)
- NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim
prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows
attackers to cause a denial of service (application crash) via a crafted input. (CVE-2022-1674)
- Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968. (CVE-2022-1733)
- Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969. (CVE-2022-1735)
- Use After Free in GitHub repository vim/vim prior to 8.2.4979. (CVE-2022-1796)
- Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. (CVE-2022-1851, CVE-2022-2126,
CVE-2022-2183, CVE-2022-2206)
- Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. (CVE-2022-1897, CVE-2022-2000,
CVE-2022-2210)
- Buffer Over-read in GitHub repository vim/vim prior to 8.2. (CVE-2022-2124)
- NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163. (CVE-2022-2208)
- Out-of-bounds Read in GitHub repository vim/vim prior to 9.0. (CVE-2022-2257, CVE-2022-2287)
- Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0. (CVE-2022-2284)
- Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0. (CVE-2022-2285)
- Use After Free in GitHub repository vim/vim prior to 9.0. (CVE-2022-2289)
- Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0. (CVE-2022-2304)
- Use After Free in GitHub repository vim/vim prior to 9.0.0046. (CVE-2022-2345)
- Improper Validation of Specified Quantity in Input in GitHub repository vim/vim prior to 9.0.0218.
(CVE-2022-2845)
Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security
advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional
issues.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2023-1303
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ecb01bec");
script_set_attribute(attribute:"solution", value:
"Update the affected vim packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-2345");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2022-0729");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2021/09/15");
script_set_attribute(attribute:"patch_publication_date", value:"2023/01/30");
script_set_attribute(attribute:"plugin_publication_date", value:"2023/01/30");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:vim-common");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:vim-enhanced");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:vim-filesystem");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:vim-minimal");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:uvp:3.0.2.2");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/uvp_version");
exit(0);
}
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var _release = get_kb_item("Host/EulerOS/release");
if (isnull(_release) || _release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
var uvp = get_kb_item("Host/EulerOS/uvp_version");
if (uvp != "3.0.2.2") audit(AUDIT_OS_NOT, "EulerOS Virtualization 3.0.2.2");
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu && "x86" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "x86" >!< cpu) audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);
var flag = 0;
var pkgs = [
"vim-common-7.4.160-4.h33.eulerosv2r7",
"vim-enhanced-7.4.160-4.h33.eulerosv2r7",
"vim-filesystem-7.4.160-4.h33.eulerosv2r7",
"vim-minimal-7.4.160-4.h33.eulerosv2r7"
];
foreach (var pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "vim");
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1674
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1897
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2000
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2042
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2124
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2125
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2126
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2183
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2206
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2207
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2208
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2210
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2257
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2284
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2285
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2287
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2289
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2304
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2345
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2845
www.nessus.org/u?ecb01bec