CVE-2024-43790

Aug. 22, 2024, 10:15 p.m.

Received
CVE has been recently published to the CVE List and has been received by the NVD.

Products

Vim

  • 9.1.0689

Source

security-advisories@github.com

Tags

CVE-2024-43790 details

Published : Aug. 22, 2024, 10:15 p.m.
Last Modified : Aug. 22, 2024, 10:15 p.m.

Description

Vim is an open source command line text editor. When performing a search and displaying the search-count message is disabled (:set shm+=S), the search pattern is displayed at the bottom of the screen in a buffer (msgbuf). When right-left mode (:set rl) is enabled, the search pattern is reversed. This happens by allocating a new buffer. If the search pattern contains some ASCII NUL characters, the buffer allocated will be smaller than the original allocated buffer (because for allocating the reversed buffer, the strlen() function is called, which only counts until it notices an ASCII NUL byte ) and thus the original length indicator is wrong. This causes an overflow when accessing characters inside the msgbuf by the previously (now wrong) length of the msgbuf. The issue has been fixed as of Vim patch v9.1.0689.

CVSS Score

1 2 3 4.5 5 6 7 8 9 10

Weakness

Weakness Name Description
CWE-122 Heap-based Buffer Overflow A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().

CVSS Data

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

Base Score

4.5

Exploitability Score

1.0

Impact Score

3.4

Base Severity

MEDIUM

References

URL Source
https://github.com/vim/vim/commit/cacb6693c10bb19f28a50eca47bc security-advisories@github.com
https://github.com/vim/vim/security/advisories/GHSA-v2x2-cjcg-f9jm security-advisories@github.com
This website uses the NVD API, but is not approved or certified by it.