Integer Overflow or Wraparound Affecting vim/vim package, versions [,9.0.2110)


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.43% (75th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-VIMVIM-6068913
  • published17 Nov 2023
  • disclosed16 Nov 2023
  • creditFabian Toepfer

Introduced: 16 Nov 2023

CVE-2023-48235  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade vim/vim to version 9.0.2110 or higher.

Overview

Affected versions of this package are vulnerable to Integer Overflow or Wraparound. When parsing relative ex addresses, a user can unintentionally trigger this vulnerability. This happens in the existing overflow check, because the line number becomes negative and LONG_MAX - lnum will cause the overflow. The impact is low, user interaction is required and a crash may not even happen in all situations.

References

CVSS Scores

version 3.1