
Cloud Vulnerability DB
A community-led vulnerabilities database
A heap-based buffer overflow vulnerability was discovered in the Vim text editor, identified as CVE-2023-4781. The vulnerability affects Vim versions prior to 9.0.1873 and was found in the vimregsubboth function. This security issue was disclosed in September 2023 and impacts multiple operating systems including Debian, Ubuntu, and macOS that ship with the affected Vim versions (NVD, Debian Security).
The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (High), with the following vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. This indicates that the vulnerability requires local access and user interaction to exploit, but can lead to high impacts on confidentiality, integrity, and availability. The issue specifically occurs in the vimregsubboth function of the Vim text editor (NVD).
If successfully exploited, this vulnerability could allow an attacker to cause heap-based buffer overflow, potentially leading to arbitrary code execution or application crashes. The high CVSS score indicates serious potential impacts on system confidentiality, integrity, and availability (NVD).
The vulnerability has been fixed in Vim version 9.0.1873 and later. Various operating system vendors have released security updates to address this issue: Debian 10 users should upgrade to version 2:8.1.0875-5+deb10u6, Ubuntu has released fixes for multiple versions, and Apple has included fixes in macOS Sonoma 14.1 (Debian Security, Apple Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."