CVE-2023-48706

Vim is a UNIX editor that, prior to version 9.0.2121, has a heap-use-after-free vulnerability. When executing a `:s` command for the very first time and using a sub-replace-special atom inside the substitution part, it is possible that the recursive `:s` call causes free-ing of memory which may later then be accessed by the initial `:s` command. The user must intentionally execute the payload and the whole process is a bit tricky to do since it seems to work only reliably for the very first :s command. It may also cause a crash of Vim. Version 9.0.2121 contains a fix for this issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
3.6 LOW
LOCAL
HIGH
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
GitHub_MCNA
3.6 LOW
LOCAL
HIGH
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 26%
VendorProductVersion
vimvim
𝑥
< 9.0.2121
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
vim
bullseye
unimportant
bookworm
unimportant
trixie
2:9.1.0861-1
fixed
sid
2:9.1.0967-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
vim
noble
Fixed 2:9.0.2116-1ubuntu2
released
mantic
Fixed 2:9.0.1672-1ubuntu2.2
released
lunar
Fixed 2:9.0.1000-4ubuntu3.3
released
jammy
Fixed 2:8.2.3995-1ubuntu2.15
released
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected