Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-48706
HistoryNov 22, 2023 - 10:15 p.m.

CVE-2023-48706

2023-11-2222:15:08
Debian Security Bug Tracker
security-tracker.debian.org
22
vim
unix
heap-use-after-free
vulnerability
fix
version 9.0.2121

4.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H

4.3 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

19.0%

Vim is a UNIX editor that, prior to version 9.0.2121, has a heap-use-after-free vulnerability. When executing a :s command for the very first time and using a sub-replace-special atom inside the substitution part, it is possible that the recursive :s call causes free-ing of memory which may later then be accessed by the initial :s command. The user must intentionally execute the payload and the whole process is a bit tricky to do since it seems to work only reliably for the very first :s command. It may also cause a crash of Vim. Version 9.0.2121 contains a fix for this issue.

4.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H

4.3 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

19.0%