Double Free Affecting vim/vim package, versions [,9.1.0647)
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.04% (15th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UNMANAGED-VIMVIM-7577999
- published 2 Aug 2024
- disclosed 1 Aug 2024
- credit Suyue Guo
Introduced: 1 Aug 2024
CVE-2024-41957 Open this link in a new tabHow to fix?
Upgrade vim/vim
to version 9.1.0647 or higher.
Overview
Affected versions of this package are vulnerable to Double Free due to the improper handling of memory in the tagstack
data structure. An attacker can cause a crash of the application by manipulating the quickfix list after a window closure, leading to a double-free scenario.
Note:
This is only exploitable if the user executes Vim with several non-default flags.
PoC
/home/vim-debug/src/vim -u NONE -X -Z -e -s -S double_free -c ':qa!'