Amazon Linux AMI : vim (ALAS-2022-1597)

critical Nessus Plugin ID 161996

Synopsis

The remote Amazon Linux AMI host is missing a security update.

Description

It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS-2022-1597 advisory.

A heap based out-of-bounds write flaw was found in vim's ops.c. This flaw allows an attacker to trick a user to open a crafted file triggering an out-of-bounds write. This vulnerability is capable of crashing software, modify memory, and possible code execution. (CVE-2022-0261)

A flaw was found in vim. The vulnerability occurs due to reading beyond the end of a line in the utf_head_off function, which can lead to a heap buffer overflow. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution. (CVE-2022-0318)

A flaw was found in vim. The vulnerability occurs due to Illegal memory access with large tabstop in Ex mode, which can lead to a heap buffer overflow. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution. (CVE-2022-0359)

Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. (CVE-2022-0361)

Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. (CVE-2022-0392)

A flaw was found in vim. The vulnerability occurs due to using freed memory when the substitute uses a recursive function call, resulting in a use-after-free vulnerability. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution. (CVE-2022-0413)

A heap-based buffer overflow flaw was found in vim's ex_retab() function of indent.c file. This flaw occurs when repeatedly using :retab. This flaw allows an attacker to trick a user into opening a crafted file triggering a heap-overflow. (CVE-2022-0572)

A heap buffer overflow flaw was found in vim's suggest_try_change() function of the spellsuggest.c file.
This flaw allows an attacker to trick a user into opening a crafted file, triggering a heap-overflow and causing an application to crash, which leads to a denial of service. (CVE-2022-0943)

A heap use-after-free vulnerability was found in Vim's utf_ptr2char() function of the src/mbyte.c file.
This flaw occurs because vim is using a buffer line after it has been freed in the old regexp engine. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use- after-free that causes an application to crash, possibly executing code and corrupting memory.
(CVE-2022-1154)

A heap buffer overflow flaw was found in vim's get_one_sourceline() function of scriptfile.c file. This flaw occurs when source can read past the end of the copied line. This flaw allows an attacker to trick a user into opening a crafted file, triggering a heap-overflow and causing an application to crash, which leads to a denial of service. (CVE-2022-1160)

A global heap buffer overflow vulnerability was found in vim's skip_range() function of the src/ex_docmd.c file. This flaw occurs because vim uses an invalid pointer with V: in Ex mode. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap buffer overflow that causes an application to crash, leading to a denial of service. (CVE-2022-1381)

A vulnerability was found in Vim. The issue occurs when using a number in a string for the lambda name, triggering an out-of-range pointer offset vulnerability. This flaw allows an attacker to trick a user into opening a crafted script containing an argument as a number and then using it as a string pointer to access any memory location, causing an application to crash and possibly access some memory.
(CVE-2022-1420)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'yum update vim' to update your system.

See Also

https://alas.aws.amazon.com/ALAS-2022-1597.html

https://alas.aws.amazon.com/cve/html/CVE-2022-0261.html

https://alas.aws.amazon.com/cve/html/CVE-2022-0318.html

https://alas.aws.amazon.com/cve/html/CVE-2022-0359.html

https://alas.aws.amazon.com/cve/html/CVE-2022-0361.html

https://alas.aws.amazon.com/cve/html/CVE-2022-0392.html

https://alas.aws.amazon.com/cve/html/CVE-2022-0413.html

https://alas.aws.amazon.com/cve/html/CVE-2022-0572.html

https://alas.aws.amazon.com/cve/html/CVE-2022-0943.html

https://alas.aws.amazon.com/cve/html/CVE-2022-1154.html

https://alas.aws.amazon.com/cve/html/CVE-2022-1160.html

https://alas.aws.amazon.com/cve/html/CVE-2022-1381.html

https://alas.aws.amazon.com/cve/html/CVE-2022-1420.html

Plugin Details

Severity: Critical

ID: 161996

File Name: ala_ALAS-2022-1597.nasl

Version: 1.4

Type: local

Agent: unix

Published: 6/10/2022

Updated: 12/11/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2022-0318

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:vim-filesystem, p-cpe:/a:amazon:linux:vim-data, p-cpe:/a:amazon:linux:vim-common, p-cpe:/a:amazon:linux:vim-minimal, p-cpe:/a:amazon:linux:vim-enhanced, cpe:/o:amazon:linux, p-cpe:/a:amazon:linux:vim-debuginfo

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/31/2022

Vulnerability Publication Date: 1/18/2022

Reference Information

CVE: CVE-2022-0261, CVE-2022-0318, CVE-2022-0359, CVE-2022-0361, CVE-2022-0392, CVE-2022-0413, CVE-2022-0572, CVE-2022-0943, CVE-2022-1154, CVE-2022-1160, CVE-2022-1381, CVE-2022-1420