cve/2023/CVE-2023-46246.md

20 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-46246](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46246)
![](https://img.shields.io/static/v1?label=Product&message=vim&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%3D%209.0.2067%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190%3A%20Integer%20Overflow%20or%20Wraparound&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-416%3A%20Use%20After%20Free&color=brighgreen)
### Description
Vim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function `ga_grow_inner` in in the file `src/alloc.c` at line 748, which is freed in the file `src/ex_docmd.c` in the function `do_cmdline` at line 1010 and then used again in `src/cmdhist.c` at line 759. When using the `:history` command, it's possible that the provided argument overflows the accepted value. Causing an Integer Overflow and potentially later an use-after-free. This vulnerability has been patched in version 9.0.2068.
### POC
#### Reference
- https://github.com/vim/vim/security/advisories/GHSA-q22m-h7m2-9mgm
2024-06-09 00:33:16 +00:00
- https://github.com/vim/vim/security/advisories/GHSA-q22m-h7m2-9mgm
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.