2024-03-18 19:03:27 +00:00

119 lines
4.5 KiB
JSON

{
"id": "CVE-2023-41036",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-07T04:20:50.427",
"lastModified": "2024-03-18T18:15:07.780",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Macvim is a text editor for MacOS. Prior to version 178, Macvim makes use of an insecure interprocess communication (IPC) mechanism which could lead to a privilege escalation. Distributed objects are a concept introduced by Apple which allow one program to vend an interface to another program. What is not made clear in the documentation is that this service can vend this interface to any other program on the machine. The impact of exploitation is a privilege escalation to root - this is likely to affect anyone who is not careful about the software they download and use MacVim to edit files that would require root privileges. Version 178 contains a fix for this issue."
},
{
"lang": "es",
"value": "Macvim es un editor de texto para MacOS. Antes de la versi\u00f3n 178, Macvim utiliza un mecanismo de Insecure Interprocess Communication (IPC) que podr\u00eda provocar una escalada de privilegios. Los objetos distribuidos son un concepto introducido por Apple que permite que un programa proporcione una interfaz a otro programa. Lo que no queda claro en la documentaci\u00f3n es que este servicio puede vender esta interfaz a cualquier otro programa en la m\u00e1quina. El impacto de la explotaci\u00f3n es una escalada de privilegios a root; esto probablemente afectar\u00e1 a cualquiera que no tenga cuidado con el software que descarga y use MacVim para editar archivos que requerir\u00edan privilegios de root. La versi\u00f3n 178 contiene una soluci\u00f3n para este problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:macvim:macvim:*:*:*:*:*:macos:*:*",
"versionEndExcluding": "178",
"matchCriteriaId": "3F7AD145-4C39-41D1-9400-48E0213E4EA8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/macvim-dev/macvim/blob/d9de087dddadbfd82fcb5dc9734380a2f829bd0a/src/MacVim/MMAppController.h#L28",
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/macvim-dev/macvim/blob/d9de087dddadbfd82fcb5dc9734380a2f829bd0a/src/MacVim/MMBackend.h",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/macvim-dev/macvim/commit/399b43e9e1dbf656a1780e87344f4d3c875e4cda",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/macvim-dev/macvim/security/advisories/GHSA-9jgj-jfwg-99fv",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}