Bug 2106779 (CVE-2022-2343) - CVE-2022-2343 vim: heap-based buffer overflow in ins_compl_add() in insexpand.c
Summary: CVE-2022-2343 vim: heap-based buffer overflow in ins_compl_add() in insexpand.c
Keywords:
Status: NEW
Alias: CVE-2022-2343
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2107288 2107289
Blocks: 2106038
TreeView+ depends on / blocked
 
Reported: 2022-07-13 14:06 UTC by Guilherme de Almeida Suckevicz
Modified: 2022-07-14 19:07 UTC (History)
4 users (show)

Fixed In Version: vim 9.0.0045
Doc Type: If docs needed, set a value
Doc Text:
A heap-based buffer overflow was found in Vim in the ins_compl_add function in the insexpand.c file. This issue occurs due to a read past the end of a buffer when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the heap-based buffer overflow, causing the application to crash, possibly executing code and corrupting memory.
Clone Of:
Environment:
Last Closed:


Attachments (Terms of Use)

Description Guilherme de Almeida Suckevicz 2022-07-13 14:06:03 UTC
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0044.

Reference:
https://huntr.dev/bounties/2ecb4345-2fc7-4e7f-adb0-83a20bb458f5

Upstream patch:
https://github.com/vim/vim/commit/caea66442d86e7bbba3bf3dc202c3c0d549b9853


Note You need to log in before you can comment on or make changes to this bug.