CVE-2023-48231Use After Free in VIM

CWE-416Use After Free8 documents7 sources
Severity
4.3MEDIUMNVD
CNA3.9OSV5.5
EPSS
0.1%
top 83.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 16
Latest updateDec 14

Description

Vim is an open source command line text editor. When closing a window, vim may try to access already freed window structure. Exploitation beyond crashing the application has not been shown to be viable. This issue has been addressed in commit `25aabc2b` which has been included in release version 9.0.2106. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:LExploitability: 2.8 | Impact: 1.4

Affected Packages4 packages

CVEListV5vim/vim< 9.0.2106
NVDvim/vim< 9.0.2106
Debianvim/vim< 2:9.0.2116-1+1
Ubuntuvim/vim< 2:8.1.2269-1ubuntu5.21+4

Also affects: Fedora 37, 38, 39

Patches

🔴Vulnerability Details

3
OSV
vim vulnerabilities2023-12-14
OSV
CVE-2023-48231: Vim is an open source command line text editor2023-11-16
CVEList
Use-After-Free in win_close() in vim2023-11-16

📋Vendor Advisories

4
Ubuntu
Vim vulnerabilities2023-12-14
Red Hat
vim: use after free in win_close()2023-11-16
Microsoft
Use-After-Free in win_close() in vim2023-11-14
Debian
CVE-2023-48231: vim - Vim is an open source command line text editor. When closing a window, vim may t...2023
CVE-2023-48231 — Use After Free in VIM | cvebase