Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-48233
HistoryNov 16, 2023 - 10:55 p.m.

CVE-2023-48233 overflow with count for :s command in vim

2023-11-1622:55:31
CWE-190
GitHub_M
www.cve.org
cve-2023-48233
vim
overflow
count
command
user interaction
e_value_too_large
upgrade
vulnerability

2.8 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L

5.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.9%

Vim is an open source command line text editor. If the count after the :s command is larger than what fits into a (signed) long variable, abort with e_value_too_large. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit ac6378773 which has been included in release version 9.0.2108. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CNA Affected

[
  {
    "vendor": "vim",
    "product": "vim",
    "versions": [
      {
        "version": "< 9.0.2108",
        "status": "affected"
      }
    ]
  }
]

2.8 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L

5.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.9%