HomeVimCVE-2023-48235

CVE-2023-48235

LOW
2.8CVSS
Published: 2023-11-16
Updated: 2024-11-21
AI Analysis

Description

Vim is an open source command line text editor. When parsing relative ex addresses one may unintentionally cause an overflow. Ironically this happens in the existing overflow check, because the line number becomes negative and LONG_MAX - lnum will cause the overflow. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `060623e` which has been included in release version 9.0.2110. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS Metrics

Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
Attack Vector
local
Complexity
low
Privileges
low
User Action
required
Scope
unchanged
Confidentiality
none
Integrity
none
Availability
low
Weaknesses
CWE-190

Metadata

Primary Vendor
VIM
Published
11/16/2023
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

vim : vimfedoraproject : fedorafedoraproject : fedorafedoraproject : fedora

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2023-48235 | LOW Severity | CVEDatabase.com | CVEDatabase.com