First published: Wed Jan 04 2023(Updated: )
AMD. A buffer overflow issue was addressed with improved memory handling.
Credit: CVE-2023-0049 CVE-2023-0051 CVE-2023-0054 CVE-2023-0288 CVE-2023-0433 CVE-2023-0512 Mickey Jin @patch1t Xin Huang @11iaxH Gertjan Franken imecKU Leuven hazbinhotel Trend Micro Zero Day InitiativeGeorgy Kucherin @kucher1n KasperskyLeonid Bezvershenko @bzvr_ KasperskyBoris Larin @oct0xor Kaspersky KasperskyValentin Pashkov Kasperskyan anonymous researcher Anonymous Trend Micro Zero Day InitiativeDohyun Lee @l33d0hyun SSD Labscrixer @pwning_me SSD LabsYe Zhang @VAR10CK Baidu SecurityJubaer Alnazi TRS Group of CompaniesCsaba Fitzl @theevilbit Offensive Securityjzhu Trend Micro Zero Day InitiativeMeysam Firouzi @R00tkitSMM Mbition Mercedesryuzaki Yiğit Can YILMAZ @yilmazcanyigit Murray Mike Pan ZhenPeng @Peterpan0927 STAR Labs SG PteArsenii Kostromin (0x3c3e) Félix Poulin-Bélanger David Pan Ogea Xinru Chi Pangu LabNed Williamson Google Project ZeroAdam Doupé ASU SEFCOMsqrtpwn an anonymous researcher Red CanaryBrandon Dalton @partyD0lphin Red CanaryMilan Tenk F FArthur Valiev FZweig Kunlun LabJoshua Jones Zhuowei Zhang developStorm Khiem Tran Mickey Jin @patch1t FFRI Security IncKoh M. Nakagawa FFRI Security Inc Offensive SecurityMasahiro Kawada @kawakatz GMO Cybersecurity by IeraeJubaer Alnazi Jabin TRS Group Of Companies Alibaba GroupWenchao Li Alibaba GroupXiaolong Bai Alibaba GroupAdam M. Guilherme Rambo Best Buddy AppsABC Research s.r.o. Mohamed Ghannam @_simo36 Chan Shue Long Offensive SecurityRıza Sabuncu @rizasabuncu JeongOhKyea Tingting Yin Tsinghua UniversityJunoh Lee at Theori CVE-2022-43551 CVE-2022-43552 Aleksandar Nikolic Cisco TalosMikko Kenttälä ) @Turmio_ SensorFu security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <13.3 | 13.3 |
Vim | <9.0.1143 | |
Fedora | =36 | |
Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID CVE-2023-0049 refers to multiple issues in Vim that were addressed by updating to version 9.0.1191.
Updating to Vim version 9.0.1191 fixes the multiple issues identified in CVE-2023-0049 by applying security patches and addressing the reported vulnerabilities.
The vulnerability CVE-2023-0049 affects Apple macOS Ventura version up to 13.3 with Vim installed.
Yes, updating to Apple macOS Ventura version 13.3 or higher will resolve the vulnerability CVE-2023-0049.
You can find more information about the vulnerability CVE-2023-0049 on the Apple support page: [https://support.apple.com/en-us/HT213670](https://support.apple.com/en-us/HT213670)