Lucene search

K
redhatcveRedhat.comRH:CVE-2022-3297
HistorySep 26, 2022 - 12:19 p.m.

CVE-2022-3297

2022-09-2612:19:23
redhat.com
access.redhat.com
20
vim
heap use-after-free
vulnerability
code execution
memory corruption
specially crafted files
process_next_cpt_value
mitigation
untrusted vim scripts

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

47.0%

A heap use-after-free vulnerability was found in Vim’s process_next_cpt_value() function of the src/insexpand.c file. This flaw occurs due to the usage of freed memory when ‘tagfunc’ wipes out the buffer that holds ‘complete.’ This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free issue that causes an application to crash, possibly executing code and corrupting memory.

Mitigation

Untrusted vim scripts with -s [scriptin] are not recommended to run.

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

47.0%