Macvim's Insecure Usage of IPC Mechanisms
CVE-2023-41036

7.8HIGH

Key Information:

Vendor

Macvim-dev

Status
Vendor
CVE Published:
7 November 2023

What is CVE-2023-41036?

Prior to version 178, Macvim—an advanced text editor for MacOS—utilized an insecure interprocess communication (IPC) method that could be exploited to gain unauthorized root access. The underlying issue stems from Apple's distributed objects, which allow one application to expose its interface to any other application on the same machine. Due to this design flaw, users who inadvertently execute untrusted applications alongside Macvim while editing files requiring elevated privileges are at risk of privilege escalation. Version 178 has been released to address and rectify this critical security flaw.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

macvim < 178

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.