Notepad++ model 8.5.7 has been launched with fixes for a number of buffer overflow zero-days, with one marked as probably resulting in code execution by tricking customers into opening specifically crafted information.
Notepad++ is a well-liked free supply code editor that helps many programming languages, could be prolonged by way of plugins, and presents productivity-enhancing options corresponding to multi-tabbed enhancing and syntax highlighting.
GitHub’s safety researcher Jaroslav Lobačevski reported the vulnerabilities in Notepad++ model 8.5.2 to the builders during the last couple of months.
Proof of idea exploits have additionally been revealed for these flaws within the researcher’s public advisory, making it important for customers to replace this system as quickly as doable.
Safety flaws in Notepad++
The found vulnerabilities contain heap buffer write and skim overflows in numerous capabilities and libraries utilized by Notepad++.
Here is a abstract of the 4 flaws found by GitHub’s researcher:
- CVE-2023-40031: Buffer overflow within the Utf8_16_Read::convert operate attributable to incorrect assumptions about UTF16 to UTF8 encoding conversions.
- CVE-2023-40036: World buffer learn overflow in CharDistributionAnalysis::HandleOneChar attributable to an array index order based mostly on the buffer dimension, exacerbated through the use of the uchardet library.
- CVE-2023-40164: World buffer learn overflow in nsCodingStateMachine::NextState. That is linked to a particular model of the uchardet library utilized by Notepad++, weak attributable to its dependency on the scale of the charLenTable buffer.
- CVE-2023-40166: Heap buffer learn overflow happens in FileManager::detectLanguageFromTextBegining attributable to failing to verify buffer lengths throughout file language detection.
Probably the most extreme of those flaws is CVE-2023-40031, assigned a CVSS v3 ranking of seven.8 (excessive), probably resulting in arbitrary code execution.
Nevertheless, a person disputes that it could be doable to carry out code execution utilizing this flaw as a result of kind of error it’s.
“Whereas it’s technically a “buffer overflow” is absolutely solely an off-by-two bug with virtually zero probability to permit for arbitrary code execution,” reads a remark to a GitHub problem opened concerning the flaws.
The opposite three points are medium-severity (5.5) issues that Lobačevski says may be leveraged to leak inside reminiscence allocation data.
Regardless of Lobačevski’s weblog and proof of idea exploits being revealed on August 21, 2023, the Notepad++ growth crew didn’t rush to answer the scenario till the person group pressed for its decision.
Finally, on August 30, 2023, a public problem was created to acknowledge the issue, and fixes for the 4 flaws made it into the principle code department on September 3, 2023.
Notepad++ 8.5.7 has now been launched and must be put in to repair the 4 vulnerabilities and different bugs listed within the changelog.