#VU68963 Use-after-free in Vim - CVE-2022-3352
Published: November 3, 2022
Vim
Vim.org
Description
The vulnerability allows a remote attacker to compromise vulnerable system.
The
vulnerability exists due to a use-after-free error when handling files
within the did_set_string_option() function in optionstr.c. A remote attacker
can trick the victim to open a specially crafted file, trigger a
use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Remediation
External links
- https://huntr.dev/bounties/d058f182-a49b-40c7-9234-43d4c5a29f60
- https://github.com/vim/vim/commit/ef976323e770315b5fca544efb6b2faa25674d15
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LSSEWQLK55MCNT4Z2IIJEJYEI5HLCODI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4QI7AETXBHPC7SGA77Q7O5IEGULWYET7/