
Cloud Vulnerability DB
A community-led vulnerabilities database
A Heap-based Buffer Overflow vulnerability was discovered in GitHub repository vim/vim prior to version 9.0.1376, identified as CVE-2023-1170. The vulnerability was disclosed on March 3, 2023, affecting various versions of the VIM editor across multiple operating systems and distributions (NVD, Debian Tracker).
The vulnerability has been assigned a CVSS v3.1 Base Score of 6.6 (Medium), with the following metrics: Attack Vector: Local, Attack Complexity: Low, Privileges Required: None, User Interaction: Required, Scope: Unchanged, Confidentiality Impact: Low, Integrity Impact: Low, Availability Impact: High. The issue specifically occurs when using put in Visual block mode, which can lead to accessing invalid memory (Ubuntu).
The vulnerability can result in a heap-based buffer overflow condition, potentially leading to program crashes, memory corruption, or possible code execution. The impact is particularly significant when the vulnerability is triggered during Visual block mode operations (Rapid7).
The vulnerability has been patched in vim version 9.0.1376. Users are advised to upgrade to this version or later. Multiple distributions have released security updates to address this vulnerability, including Ubuntu, Debian, and Fedora. The fix involves adjusting the cursor column when needed, as implemented in the patch (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."