The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:4282-1 advisory.
vim is vulnerable to Use of Uninitialized Variable (CVE-2021-3928)
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259. (CVE-2022-2980)
Use After Free in GitHub repository vim/vim prior to 9.0.0260. (CVE-2022-2982)
Use After Free in GitHub repository vim/vim prior to 9.0.0322. (CVE-2022-3037)
Use After Free in GitHub repository vim/vim prior to 9.0.0360. (CVE-2022-3099)
Use After Free in GitHub repository vim/vim prior to 9.0.0389. (CVE-2022-3134)
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404. (CVE-2022-3153)
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483. (CVE-2022-3234)
Use After Free in GitHub repository vim/vim prior to 9.0.0490. (CVE-2022-3235)
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0552. (CVE-2022-3278)
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0577. (CVE-2022-3296)
Use After Free in GitHub repository vim/vim prior to 9.0.0579. (CVE-2022-3297)
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0598. (CVE-2022-3324)
Use After Free in GitHub repository vim/vim prior to 9.0.0614. (CVE-2022-3352)
A vulnerability was found in vim and classified as problematic. Affected by this issue is the function qf_update_buffer of the file quickfix.c of the component autocmd Handler. The manipulation leads to use after free. The attack may be launched remotely. Upgrading to version 9.0.0805 is able to address this issue. The name of the patch is d0fab10ed2a86698937e3c3fed2f10bd9bb5e731. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-212324. (CVE-2022-3705)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The package checks in this plugin were extracted from
# SUSE update advisory SUSE-SU-2022:4282-1. The text itself
# is copyright (C) SUSE.
##
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(168293);
script_version("1.10");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/07/14");
script_cve_id(
"CVE-2021-3928",
"CVE-2022-2980",
"CVE-2022-2982",
"CVE-2022-3037",
"CVE-2022-3099",
"CVE-2022-3134",
"CVE-2022-3153",
"CVE-2022-3234",
"CVE-2022-3235",
"CVE-2022-3278",
"CVE-2022-3296",
"CVE-2022-3297",
"CVE-2022-3324",
"CVE-2022-3352",
"CVE-2022-3705"
);
script_xref(name:"SuSE", value:"SUSE-SU-2022:4282-1");
script_xref(name:"IAVB", value:"2022-B-0049-S");
script_xref(name:"IAVB", value:"2023-B-0016-S");
script_name(english:"SUSE SLED15 / SLES15 Security Update : vim (SUSE-SU-2022:4282-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote SUSE host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 host has packages installed that are affected by
multiple vulnerabilities as referenced in the SUSE-SU-2022:4282-1 advisory.
- vim is vulnerable to Use of Uninitialized Variable (CVE-2021-3928)
- NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259. (CVE-2022-2980)
- Use After Free in GitHub repository vim/vim prior to 9.0.0260. (CVE-2022-2982)
- Use After Free in GitHub repository vim/vim prior to 9.0.0322. (CVE-2022-3037)
- Use After Free in GitHub repository vim/vim prior to 9.0.0360. (CVE-2022-3099)
- Use After Free in GitHub repository vim/vim prior to 9.0.0389. (CVE-2022-3134)
- NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404. (CVE-2022-3153)
- Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483. (CVE-2022-3234)
- Use After Free in GitHub repository vim/vim prior to 9.0.0490. (CVE-2022-3235)
- NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0552. (CVE-2022-3278)
- Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0577. (CVE-2022-3296)
- Use After Free in GitHub repository vim/vim prior to 9.0.0579. (CVE-2022-3297)
- Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0598. (CVE-2022-3324)
- Use After Free in GitHub repository vim/vim prior to 9.0.0614. (CVE-2022-3352)
- A vulnerability was found in vim and classified as problematic. Affected by this issue is the function
qf_update_buffer of the file quickfix.c of the component autocmd Handler. The manipulation leads to use
after free. The attack may be launched remotely. Upgrading to version 9.0.0805 is able to address this
issue. The name of the patch is d0fab10ed2a86698937e3c3fed2f10bd9bb5e731. It is recommended to upgrade the
affected component. The identifier of this vulnerability is VDB-212324. (CVE-2022-3705)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1192478");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1202962");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203110");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203152");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203155");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203194");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203272");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203508");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203509");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203796");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203797");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203799");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203820");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203924");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204779");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-3928");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-2980");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-2982");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3037");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3099");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3134");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3153");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3234");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3235");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3278");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3296");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3297");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3324");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3352");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3705");
# https://lists.suse.com/pipermail/sle-security-updates/2022-November/013152.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f60bbfac");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2021-3928");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2022-3352");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2021/11/05");
script_set_attribute(attribute:"patch_publication_date", value:"2022/11/29");
script_set_attribute(attribute:"plugin_publication_date", value:"2022/11/30");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gvim");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:vim");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:vim-data");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:vim-data-common");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:vim-small");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:15");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include('rpm.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item("Host/SuSE/release");
if (isnull(os_release) || os_release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
var os_ver = pregmatch(pattern: "^(SLE(S|D)(?:_SAP)?\d+)", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE');
os_ver = os_ver[1];
if (! preg(pattern:"^(SLED15|SLED_SAP15|SLES15|SLES_SAP15)$", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15', 'SUSE (' + os_ver + ')');
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE (' + os_ver + ')', cpu);
var service_pack = get_kb_item("Host/SuSE/patchlevel");
if (isnull(service_pack)) service_pack = "0";
if (os_ver == "SLED15" && (! preg(pattern:"^(3)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLED15 SP3", os_ver + " SP" + service_pack);
if (os_ver == "SLED_SAP15" && (! preg(pattern:"^(3)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLED_SAP15 SP3", os_ver + " SP" + service_pack);
if (os_ver == "SLES15" && (! preg(pattern:"^(3)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES15 SP3", os_ver + " SP" + service_pack);
if (os_ver == "SLES_SAP15" && (! preg(pattern:"^(2|3)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES_SAP15 SP2/3", os_ver + " SP" + service_pack);
var pkgs = [
{'reference':'gvim-9.0.0814-150000.5.28.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.2']},
{'reference':'vim-9.0.0814-150000.5.28.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.2']},
{'reference':'vim-data-9.0.0814-150000.5.28.1', 'sp':'2', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.2']},
{'reference':'vim-data-common-9.0.0814-150000.5.28.1', 'sp':'2', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.2']},
{'reference':'vim-9.0.0814-150000.5.28.1', 'sp':'3', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.3']},
{'reference':'vim-9.0.0814-150000.5.28.1', 'sp':'3', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.3']},
{'reference':'vim-data-9.0.0814-150000.5.28.1', 'sp':'3', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.3']},
{'reference':'vim-data-9.0.0814-150000.5.28.1', 'sp':'3', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.3']},
{'reference':'vim-data-common-9.0.0814-150000.5.28.1', 'sp':'3', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.3']},
{'reference':'vim-data-common-9.0.0814-150000.5.28.1', 'sp':'3', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.3']},
{'reference':'vim-small-9.0.0814-150000.5.28.1', 'sp':'3', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.3']},
{'reference':'vim-small-9.0.0814-150000.5.28.1', 'sp':'3', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.3']},
{'reference':'vim-9.0.0814-150000.5.28.1', 'sp':'3', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.3', 'sle-module-basesystem-release-15.3', 'sled-release-15.3', 'sles-release-15.3']},
{'reference':'vim-9.0.0814-150000.5.28.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.3', 'sle-module-basesystem-release-15.3', 'sled-release-15.3', 'sles-release-15.3']},
{'reference':'vim-data-9.0.0814-150000.5.28.1', 'sp':'3', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.3', 'sle-module-basesystem-release-15.3', 'sled-release-15.3', 'sles-release-15.3']},
{'reference':'vim-data-9.0.0814-150000.5.28.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.3', 'sle-module-basesystem-release-15.3', 'sled-release-15.3', 'sles-release-15.3']},
{'reference':'vim-data-common-9.0.0814-150000.5.28.1', 'sp':'3', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.3', 'sle-module-basesystem-release-15.3', 'sled-release-15.3', 'sles-release-15.3']},
{'reference':'vim-data-common-9.0.0814-150000.5.28.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.3', 'sle-module-basesystem-release-15.3', 'sled-release-15.3', 'sles-release-15.3']},
{'reference':'vim-small-9.0.0814-150000.5.28.1', 'sp':'3', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.3', 'sle-module-basesystem-release-15.3', 'sled-release-15.3', 'sles-release-15.3']},
{'reference':'vim-small-9.0.0814-150000.5.28.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.3', 'sle-module-basesystem-release-15.3', 'sled-release-15.3', 'sles-release-15.3']}
];
var ltss_caveat_required = FALSE;
var flag = 0;
foreach var package_array ( pkgs ) {
var reference = NULL;
var _release = NULL;
var sp = NULL;
var _cpu = NULL;
var exists_check = NULL;
var rpm_spec_vers_cmp = NULL;
if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
if (!empty_or_null(package_array['release'])) _release = package_array['release'];
if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];
if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];
if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
if (reference && _release) {
if (exists_check) {
var check_flag = 0;
foreach var check (exists_check) {
if (!rpm_exists(release:_release, rpm:check)) continue;
check_flag++;
}
if (!check_flag) continue;
}
if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;
}
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'gvim / vim / vim-data / vim-data-common / vim-small');
}
Vendor | Product | Version | CPE |
---|---|---|---|
novell | suse_linux | gvim | p-cpe:/a:novell:suse_linux:gvim |
novell | suse_linux | vim | p-cpe:/a:novell:suse_linux:vim |
novell | suse_linux | vim-data | p-cpe:/a:novell:suse_linux:vim-data |
novell | suse_linux | vim-data-common | p-cpe:/a:novell:suse_linux:vim-data-common |
novell | suse_linux | vim-small | p-cpe:/a:novell:suse_linux:vim-small |
novell | suse_linux | 15 | cpe:/o:novell:suse_linux:15 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2980
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2982
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3037
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3099
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3134
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3153
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3234
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3235
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3278
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3296
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3297
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3324
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3352
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3705
www.nessus.org/u?f60bbfac
bugzilla.suse.com/1192478
bugzilla.suse.com/1202962
bugzilla.suse.com/1203110
bugzilla.suse.com/1203152
bugzilla.suse.com/1203155
bugzilla.suse.com/1203194
bugzilla.suse.com/1203272
bugzilla.suse.com/1203508
bugzilla.suse.com/1203509
bugzilla.suse.com/1203796
bugzilla.suse.com/1203797
bugzilla.suse.com/1203799
bugzilla.suse.com/1203820
bugzilla.suse.com/1203924
bugzilla.suse.com/1204779
www.suse.com/security/cve/CVE-2021-3928
www.suse.com/security/cve/CVE-2022-2980
www.suse.com/security/cve/CVE-2022-2982
www.suse.com/security/cve/CVE-2022-3037
www.suse.com/security/cve/CVE-2022-3099
www.suse.com/security/cve/CVE-2022-3134
www.suse.com/security/cve/CVE-2022-3153
www.suse.com/security/cve/CVE-2022-3234
www.suse.com/security/cve/CVE-2022-3235
www.suse.com/security/cve/CVE-2022-3278
www.suse.com/security/cve/CVE-2022-3296
www.suse.com/security/cve/CVE-2022-3297
www.suse.com/security/cve/CVE-2022-3324
www.suse.com/security/cve/CVE-2022-3352
www.suse.com/security/cve/CVE-2022-3705