CVE-2022-0368 - Out-of-bounds Read

Severity

78%

Complexity

18%

Confidentiality

98%

Out-of-bounds Read in Conda vim prior to 8.2.

Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.

CVSS 3.1 Base Score 7.8. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).

CVSS 2.0 Base Score 6.8. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P).

Demo Examples

Out-of-bounds Read

CWE-125

In the following code, the method retrieves a value from an array at a specific array index location that is given as an input parameter to the method


               
}
return value;// check that the array index is less than the maximum// length of the array
value = array[index];// get the value at the specified index of the array
// if array index is invalid then output error message// and return value indicating error
value = -1;

However, this method only verifies that the given array index is less than the maximum length of the array but does not check for the minimum value (CWE-839). This will allow a negative value to be accepted as the input array index, which will result in a out of bounds read (CWE-125) and may allow access to sensitive memory. The input array index should be checked to verify that is within the maximum and minimum range required for the array (CWE-129). In this example the if statement should be modified to include a minimum range check, as shown below.


               
...// check that the array index is within the correct// range of values for the array

Overview

First reported 3 years ago

2022-01-26 18:15:00

Last updated 2 years ago

2022-11-09 03:52:00

Affected Software

Debian Linux 9.0

9.0

openSUSE Factory

References

https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9

https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa

https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9

Exploit, Issue Tracking, Patch, Third Party Advisory

https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa

Patch, Third Party Advisory

[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update

[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update

Mailing List, Third Party Advisory

GLSA-202208-32

GLSA-202208-32

Third Party Advisory

https://support.apple.com/kb/HT213488

https://support.apple.com/kb/HT213444

20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13

20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13

20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6

https://support.apple.com/kb/HT213488

Vendor Advisory

https://support.apple.com/kb/HT213444

Vendor Advisory

20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13

Third Party Advisory

20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13

Third Party Advisory

20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6

Third Party Advisory

20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13

Mailing List, Third Party Advisory

20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13

Mailing List, Third Party Advisory

20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6

Mailing List, Third Party Advisory

[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update

Mailing List, Third Party Advisory

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.