CVE-2023-48706

Updated: 2025-08-20 00:12:54.778825

Description:

Vim is a UNIX editor that, prior to version 9.0.2121, has a heap-use-after-free vulnerability. When executing a `:s` command for the very first time and using a sub-replace-special atom inside the substitution part, it is possible that the recursive `:s` call causes free-ing of memory which may later then be accessed by the initial `:s` command. The user must intentionally execute the payload and the whole process is a bit tricky to do since it seems to work only reliably for the very first :s command. It may also cause a crash of Vim. Version 9.0.2121 contains a fix for this issue.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x MEDIUM 4.7

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU vim 8.2.2637 4.7 MEDIUM Ignored 2025-01-10 00:56:10 This flaw is only exploitable in a local, interactive Vim session by intentionally executing a britt...
CentOS 6 ELS vim 7.4.629 4.7 MEDIUM Ignored 2023-12-04 03:40:46 Ignored due to low severity
CentOS 7 ELS vim 7.4.629 4.7 MEDIUM Ignored 2024-06-25 11:20:07 Ignored due to low severity
CloudLinux 6 ELS vim 7.4.629 4.7 MEDIUM Ignored 2023-12-04 03:40:46 Ignored due to low severity
Debian 10 ELS vim 8.1.0875 4.7 MEDIUM Ignored 2025-10-11 00:16:56 Ignored due to low severity
Oracle Linux 6 ELS vim 7.4.629 4.7 MEDIUM Ignored 2023-12-04 03:40:47 Ignored due to low severity
Ubuntu 16.04 ELS vim 7.4.1689-3 4.7 MEDIUM Not Vulnerable 2023-12-19 13:09:19