vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000812 - | |
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2002-December/002948.html - | |
References | () http://marc.info/?l=bugtraq&m=108077992208690&w=2 - | |
References | () http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/55700 - | |
References | () http://www.guninski.com/vim1.html - Patch, Vendor Advisory | |
References | () http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:012 - | |
References | () http://www.redhat.com/support/errata/RHSA-2002-297.html - Patch, Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2002-302.html - | |
References | () http://www.securityfocus.com/bid/6384 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/10835 - |
Information
Published : 2002-12-23 05:00
Updated : 2024-11-20 23:41
NVD link : CVE-2002-1377
Mitre link : CVE-2002-1377
CVE.ORG link : CVE-2002-1377
JSON object : View
Products Affected
vim_development_group
- vim
CWE