Vulnerabilites related to vim_development_group - vim
CVE-2005-0069 (GCVE-0-2005-0069)
Vulnerability from cvelistv5
Published
2005-01-29 05:00
Modified
2024-08-07 20:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The (1) tcltags or (2) vimspell.sh scripts in vim 6.3 allow local users to overwrite or create arbitrary files via a symlink attack on temporary files.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:57:40.842Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1012938", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1012938" }, { "name": "FLSA:2343", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2343" }, { "name": "20050118 [USN-61-1] vim vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=110608387001863\u0026w=2" }, { "name": "RHSA-2005:122", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-122.html" }, { "name": "oval:org.mitre.oval:def:9402", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9402" }, { "name": "13841", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/13841/" }, { "name": "vim-symlink(18870)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18870" }, { "name": "RHSA-2005:036", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-036.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-01-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The (1) tcltags or (2) vimspell.sh scripts in vim 6.3 allow local users to overwrite or create arbitrary files via a symlink attack on temporary files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1012938", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1012938" }, { "name": "FLSA:2343", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2343" }, { "name": "20050118 [USN-61-1] vim vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=110608387001863\u0026w=2" }, { "name": "RHSA-2005:122", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-122.html" }, { "name": "oval:org.mitre.oval:def:9402", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9402" }, { "name": "13841", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/13841/" }, { "name": "vim-symlink(18870)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18870" }, { "name": "RHSA-2005:036", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-036.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0069", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The (1) tcltags or (2) vimspell.sh scripts in vim 6.3 allow local users to overwrite or create arbitrary files via a symlink attack on temporary files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1012938", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1012938" }, { "name": "FLSA:2343", "refsource": "FEDORA", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2343" }, { "name": "20050118 [USN-61-1] vim vulnerabilities", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=110608387001863\u0026w=2" }, { "name": "RHSA-2005:122", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-122.html" }, { "name": "oval:org.mitre.oval:def:9402", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9402" }, { "name": "13841", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/13841/" }, { "name": "vim-symlink(18870)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18870" }, { "name": "RHSA-2005:036", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-036.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0069", "datePublished": "2005-01-29T05:00:00", "dateReserved": "2005-01-14T00:00:00", "dateUpdated": "2024-08-07T20:57:40.842Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-1377 (GCVE-0-2002-1377)
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 03:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:19:28.975Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "6384", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6384" }, { "name": "RHSA-2002:302", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-302.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.guninski.com/vim1.html" }, { "name": "20021213 Some vim problems, yet still vim much better than windows", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2002-December/002948.html" }, { "name": "RHSA-2002:297", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-297.html" }, { "name": "55700", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/55700" }, { "name": "CLA-2004:812", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000812" }, { "name": "MDKSA-2003:012", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:012" }, { "name": "20040331 OpenLinux: vim arbitrary commands execution through modelines", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108077992208690\u0026w=2" }, { "name": "vim-modeline-command-execution(10835)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10835" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-12-12T00:00:00", "descriptions": [ { "lang": "en", "value": "vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-11-29T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "6384", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6384" }, { "name": "RHSA-2002:302", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-302.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.guninski.com/vim1.html" }, { "name": "20021213 Some vim problems, yet still vim much better than windows", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2002-December/002948.html" }, { "name": "RHSA-2002:297", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-297.html" }, { "name": "55700", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/55700" }, { "name": "CLA-2004:812", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000812" }, { "name": "MDKSA-2003:012", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:012" }, { "name": "20040331 OpenLinux: vim arbitrary commands execution through modelines", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108077992208690\u0026w=2" }, { "name": "vim-modeline-command-execution(10835)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10835" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1377", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "6384", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6384" }, { "name": "RHSA-2002:302", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2002-302.html" }, { "name": "http://www.guninski.com/vim1.html", "refsource": "MISC", "url": "http://www.guninski.com/vim1.html" }, { "name": "20021213 Some vim problems, yet still vim much better than windows", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2002-December/002948.html" }, { "name": "RHSA-2002:297", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2002-297.html" }, { "name": "55700", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/55700" }, { "name": "CLA-2004:812", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000812" }, { "name": "MDKSA-2003:012", "refsource": "MANDRAKE", "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:012" }, { "name": "20040331 OpenLinux: vim arbitrary commands execution through modelines", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108077992208690\u0026w=2" }, { "name": "vim-modeline-command-execution(10835)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10835" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1377", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2002-12-16T00:00:00", "dateUpdated": "2024-08-08T03:19:28.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-2368 (GCVE-0-2005-2368)
Vulnerability from cvelistv5
Published
2005-07-26 04:00
Modified
2024-08-07 22:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
vim 6.3 before 6.3.082, with modelines enabled, allows external user-assisted attackers to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:22:49.053Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "14374", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14374" }, { "name": "RHSA-2005:745", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-745.html" }, { "name": "20050725 Help poor children in Uganda", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-July/035402.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.guninski.com/where_do_you_want_billg_to_go_today_5.html" }, { "name": "oval:org.mitre.oval:def:11302", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11302" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-07-25T00:00:00", "descriptions": [ { "lang": "en", "value": "vim 6.3 before 6.3.082, with modelines enabled, allows external user-assisted attackers to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "14374", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14374" }, { "name": "RHSA-2005:745", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-745.html" }, { "name": "20050725 Help poor children in Uganda", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-July/035402.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.guninski.com/where_do_you_want_billg_to_go_today_5.html" }, { "name": "oval:org.mitre.oval:def:11302", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11302" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2368", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "vim 6.3 before 6.3.082, with modelines enabled, allows external user-assisted attackers to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "14374", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14374" }, { "name": "RHSA-2005:745", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-745.html" }, { "name": "20050725 Help poor children in Uganda", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-July/035402.html" }, { "name": "http://www.guninski.com/where_do_you_want_billg_to_go_today_5.html", "refsource": "MISC", "url": "http://www.guninski.com/where_do_you_want_billg_to_go_today_5.html" }, { "name": "oval:org.mitre.oval:def:11302", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11302" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2368", "datePublished": "2005-07-26T04:00:00", "dateReserved": "2005-07-26T00:00:00", "dateUpdated": "2024-08-07T22:22:49.053Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2001-0408 (GCVE-0-2001-0408)
Vulnerability from cvelistv5
Published
2001-09-18 04:00
Modified
2024-08-08 04:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:21:37.608Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "CSSA-2001-014.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA", "x_transferred" ], "url": "http://www.calderasystems.com/support/security/advisories/CSSA-2001-014.0.txt" }, { "name": "vim-elevate-privileges(6259)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6259" }, { "name": "RHSA-2001:008", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-008.html" }, { "name": "20010329 Immunix OS Security update for vim", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=98593106111968\u0026w=2" }, { "name": "2510", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/2510" }, { "name": "MDKSA-2001:035", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-035.php3" }, { "name": "SuSE-SA:2001:12", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2001_012_vim.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-03-21T00:00:00", "descriptions": [ { "lang": "en", "value": "vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "CSSA-2001-014.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA" ], "url": "http://www.calderasystems.com/support/security/advisories/CSSA-2001-014.0.txt" }, { "name": "vim-elevate-privileges(6259)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6259" }, { "name": "RHSA-2001:008", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-008.html" }, { "name": "20010329 Immunix OS Security update for vim", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=98593106111968\u0026w=2" }, { "name": "2510", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/2510" }, { "name": "MDKSA-2001:035", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-035.php3" }, { "name": "SuSE-SA:2001:12", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2001_012_vim.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0408", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "CSSA-2001-014.0", "refsource": "CALDERA", "url": "http://www.calderasystems.com/support/security/advisories/CSSA-2001-014.0.txt" }, { "name": "vim-elevate-privileges(6259)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6259" }, { "name": "RHSA-2001:008", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2001-008.html" }, { "name": "20010329 Immunix OS Security update for vim", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=98593106111968\u0026w=2" }, { "name": "2510", "refsource": "BID", "url": "http://www.securityfocus.com/bid/2510" }, { "name": "MDKSA-2001:035", "refsource": "MANDRAKE", "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-035.php3" }, { "name": "SuSE-SA:2001:12", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2001_012_vim.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0408", "datePublished": "2001-09-18T04:00:00", "dateReserved": "2001-05-24T00:00:00", "dateUpdated": "2024-08-08T04:21:37.608Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-2438 (GCVE-0-2007-2438)
Vulnerability from cvelistv5
Published
2007-05-02 21:00
Modified
2024-08-07 13:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:42:32.149Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25024", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25024" }, { "name": "25159", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25159" }, { "name": "[vim-dev] 20070426 feedkeys() allowed in sandbox", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=vim-dev\u0026m=117762581821298\u0026w=2" }, { "name": "1018035", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018035" }, { "name": "USN-463-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-463-1" }, { "name": "ADV-2007-1599", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1599" }, { "name": "25182", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25182" }, { "name": "2007-0017", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2007/0017/" }, { "name": "SUSE-SR:2007:012", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_12_sr.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://tech.groups.yahoo.com/group/vimdev/message/46627" }, { "name": "[vim-dev] 20070428 Re: feedkeys() allowed in sandbox", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=vim-dev\u0026m=117778983714029\u0026w=2" }, { "name": "RHSA-2007:0346", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0346.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://tech.groups.yahoo.com/group/vimdev/message/46658" }, { "name": "vim-feedkeyswritefile-command-execution(34012)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34012" }, { "name": "DSA-1364", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1364" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tech.groups.yahoo.com/group/vimdev/message/46645" }, { "name": "26653", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26653" }, { "name": "20070513 OMG VIM VULN", "tags": [ "mailing-list", "x_refsource_VIM", "x_transferred" ], "url": "http://attrition.org/pipermail/vim/2007-May/001614.html" }, { "name": "20070823 vim editor duplicates / clarifications", "tags": [ "mailing-list", "x_refsource_VIM", "x_transferred" ], "url": "http://www.attrition.org/pipermail/vim/2007-August/001770.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vim.org/news/news.php" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=238259" }, { "name": "23725", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23725" }, { "name": "20070430 FLEA-2007-0014-1: vim", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/467202/100/0/threaded" }, { "name": "[vimannounce] 20070512 Stable Vim version 7.1 has been released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://tech.groups.yahoo.com/group/vimannounce/message/178" }, { "name": "25255", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25255" }, { "name": "oval:org.mitre.oval:def:9876", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9876" }, { "name": "MDKSA-2007:101", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:101" }, { "name": "25432", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25432" }, { "name": "25367", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25367" }, { "name": "36250", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/36250" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-04-26T00:00:00", "descriptions": [ { "lang": "en", "value": "The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "25024", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25024" }, { "name": "25159", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25159" }, { "name": "[vim-dev] 20070426 feedkeys() allowed in sandbox", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=vim-dev\u0026m=117762581821298\u0026w=2" }, { "name": "1018035", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018035" }, { "name": "USN-463-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-463-1" }, { "name": "ADV-2007-1599", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1599" }, { "name": "25182", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25182" }, { "name": "2007-0017", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2007/0017/" }, { "name": "SUSE-SR:2007:012", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_12_sr.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://tech.groups.yahoo.com/group/vimdev/message/46627" }, { "name": "[vim-dev] 20070428 Re: feedkeys() allowed in sandbox", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=vim-dev\u0026m=117778983714029\u0026w=2" }, { "name": "RHSA-2007:0346", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0346.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://tech.groups.yahoo.com/group/vimdev/message/46658" }, { "name": "vim-feedkeyswritefile-command-execution(34012)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34012" }, { "name": "DSA-1364", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1364" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tech.groups.yahoo.com/group/vimdev/message/46645" }, { "name": "26653", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26653" }, { "name": "20070513 OMG VIM VULN", "tags": [ "mailing-list", "x_refsource_VIM" ], "url": "http://attrition.org/pipermail/vim/2007-May/001614.html" }, { "name": "20070823 vim editor duplicates / clarifications", "tags": [ "mailing-list", "x_refsource_VIM" ], "url": "http://www.attrition.org/pipermail/vim/2007-August/001770.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vim.org/news/news.php" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=238259" }, { "name": "23725", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23725" }, { "name": "20070430 FLEA-2007-0014-1: vim", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/467202/100/0/threaded" }, { "name": "[vimannounce] 20070512 Stable Vim version 7.1 has been released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://tech.groups.yahoo.com/group/vimannounce/message/178" }, { "name": "25255", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25255" }, { "name": "oval:org.mitre.oval:def:9876", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9876" }, { "name": "MDKSA-2007:101", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:101" }, { "name": "25432", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25432" }, { "name": "25367", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25367" }, { "name": "36250", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/36250" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2007-2438", "datePublished": "2007-05-02T21:00:00", "dateReserved": "2007-05-01T00:00:00", "dateUpdated": "2024-08-07T13:42:32.149Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2001-0409 (GCVE-0-2001-0409)
Vulnerability from cvelistv5
Published
2001-09-18 04:00
Modified
2024-08-08 04:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
vim (aka gvim) allows local users to modify files being edited by other users via a symlink attack on the backup and swap files, when the victim is editing the file in a world writable directory.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:21:37.227Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "CSSA-2001-014.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA", "x_transferred" ], "url": "http://www.calderasystems.com/support/security/advisories/CSSA-2001-014.0.txt" }, { "name": "vim-tmp-symlink(6628)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6628" }, { "name": "SuSE-SA:2001:12", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2001_012_vim.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-03-26T00:00:00", "descriptions": [ { "lang": "en", "value": "vim (aka gvim) allows local users to modify files being edited by other users via a symlink attack on the backup and swap files, when the victim is editing the file in a world writable directory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "CSSA-2001-014.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA" ], "url": "http://www.calderasystems.com/support/security/advisories/CSSA-2001-014.0.txt" }, { "name": "vim-tmp-symlink(6628)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6628" }, { "name": "SuSE-SA:2001:12", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2001_012_vim.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0409", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "vim (aka gvim) allows local users to modify files being edited by other users via a symlink attack on the backup and swap files, when the victim is editing the file in a world writable directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "CSSA-2001-014.0", "refsource": "CALDERA", "url": "http://www.calderasystems.com/support/security/advisories/CSSA-2001-014.0.txt" }, { "name": "vim-tmp-symlink(6628)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6628" }, { "name": "SuSE-SA:2001:12", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2001_012_vim.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0409", "datePublished": "2001-09-18T04:00:00", "dateReserved": "2001-05-24T00:00:00", "dateUpdated": "2024-08-08T04:21:37.227Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-2953 (GCVE-0-2007-2953)
Vulnerability from cvelistv5
Published
2007-07-31 10:00
Modified
2024-08-07 13:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the helptags command.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:57:54.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0004.html" }, { "name": "25095", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25095" }, { "name": "26822", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26822" }, { "name": "MDKSA-2007:168", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:168" }, { "name": "26522", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26522" }, { "name": "26285", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26285" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1595" }, { "name": "26594", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26594" }, { "name": "25941", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25941" }, { "name": "32858", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32858" }, { "name": "33410", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33410" }, { "name": "USN-505-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-505-1" }, { "name": "RHSA-2008:0580", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0580.html" }, { "name": "20070730 FLEA-2007-0036-1 vim vim-minimal gvim", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/475076/100/100/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm" }, { "name": "ADV-2007-2687", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2687" }, { "name": "ADV-2009-0904", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0904" }, { "name": "ADV-2009-0033", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0033" }, { "name": "20090401 VMSA-2009-0004 ESX Service Console updates for openssl, bind, and vim", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/502322/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:6463", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6463" }, { "name": "2007-0026", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2007/0026/" }, { "name": "DSA-1364", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1364" }, { "name": "SUSE-SR:2007:018", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_18_sr.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2007-66/advisory/" }, { "name": "26653", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26653" }, { "name": "20070823 vim editor duplicates / clarifications", "tags": [ "mailing-list", "x_refsource_VIM", "x_transferred" ], "url": "http://www.attrition.org/pipermail/vim/2007-August/001770.html" }, { "name": "oval:org.mitre.oval:def:11549", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11549" }, { "name": "vim-helptagsone-code-execution(35655)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35655" }, { "name": "MDVSA-2008:236", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:236" }, { "name": "26674", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26674" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "ftp://ftp.vim.org/pub/vim/patches/7.1/7.1.039" }, { "name": "RHSA-2008:0617", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0617.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the helptags command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0004.html" }, { "name": "25095", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25095" }, { "name": "26822", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26822" }, { "name": "MDKSA-2007:168", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:168" }, { "name": "26522", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26522" }, { "name": "26285", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26285" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1595" }, { "name": "26594", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26594" }, { "name": "25941", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25941" }, { "name": "32858", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32858" }, { "name": "33410", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33410" }, { "name": "USN-505-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-505-1" }, { "name": "RHSA-2008:0580", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0580.html" }, { "name": "20070730 FLEA-2007-0036-1 vim vim-minimal gvim", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/475076/100/100/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm" }, { "name": "ADV-2007-2687", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2687" }, { "name": "ADV-2009-0904", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0904" }, { "name": "ADV-2009-0033", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0033" }, { "name": "20090401 VMSA-2009-0004 ESX Service Console updates for openssl, bind, and vim", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/502322/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:6463", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6463" }, { "name": "2007-0026", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2007/0026/" }, { "name": "DSA-1364", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1364" }, { "name": "SUSE-SR:2007:018", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_18_sr.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2007-66/advisory/" }, { "name": "26653", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26653" }, { "name": "20070823 vim editor duplicates / clarifications", "tags": [ "mailing-list", "x_refsource_VIM" ], "url": "http://www.attrition.org/pipermail/vim/2007-August/001770.html" }, { "name": "oval:org.mitre.oval:def:11549", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11549" }, { "name": "vim-helptagsone-code-execution(35655)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35655" }, { "name": "MDVSA-2008:236", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:236" }, { "name": "26674", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26674" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "ftp://ftp.vim.org/pub/vim/patches/7.1/7.1.039" }, { "name": "RHSA-2008:0617", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0617.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2007-2953", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the helptags command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0004.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0004.html" }, { "name": "25095", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25095" }, { "name": "26822", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26822" }, { "name": "MDKSA-2007:168", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:168" }, { "name": "26522", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26522" }, { "name": "26285", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26285" }, { "name": "https://issues.rpath.com/browse/RPL-1595", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1595" }, { "name": "26594", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26594" }, { "name": "25941", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25941" }, { "name": "32858", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32858" }, { "name": "33410", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33410" }, { "name": "USN-505-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-505-1" }, { "name": "RHSA-2008:0580", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0580.html" }, { "name": "20070730 FLEA-2007-0036-1 vim vim-minimal gvim", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/475076/100/100/threaded" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm" }, { "name": "ADV-2007-2687", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2687" }, { "name": "ADV-2009-0904", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0904" }, { "name": "ADV-2009-0033", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0033" }, { "name": "20090401 VMSA-2009-0004 ESX Service Console updates for openssl, bind, and vim", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/502322/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:6463", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6463" }, { "name": "2007-0026", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2007/0026/" }, { "name": "DSA-1364", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1364" }, { "name": "SUSE-SR:2007:018", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_18_sr.html" }, { "name": "http://secunia.com/secunia_research/2007-66/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2007-66/advisory/" }, { "name": "26653", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26653" }, { "name": "20070823 vim editor duplicates / clarifications", "refsource": "VIM", "url": "http://www.attrition.org/pipermail/vim/2007-August/001770.html" }, { "name": "oval:org.mitre.oval:def:11549", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11549" }, { "name": "vim-helptagsone-code-execution(35655)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35655" }, { "name": "MDVSA-2008:236", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:236" }, { "name": "26674", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26674" }, { "name": "ftp://ftp.vim.org/pub/vim/patches/7.1/7.1.039", "refsource": "CONFIRM", "url": "ftp://ftp.vim.org/pub/vim/patches/7.1/7.1.039" }, { "name": "RHSA-2008:0617", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0617.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2007-2953", "datePublished": "2007-07-31T10:00:00", "dateReserved": "2007-05-31T00:00:00", "dateUpdated": "2024-08-07T13:57:54.700Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-1138 (GCVE-0-2004-1138)
Vulnerability from cvelistv5
Published
2004-12-22 05:00
Modified
2024-08-08 00:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
VIM before 6.3 and gVim before 6.3 allow local users to execute arbitrary commands via a file containing a crafted modeline that is executed when the file is viewed using options such as (1) termcap, (2) printdevice, (3) titleold, (4) filetype, (5) syntax, (6) backupext, (7) keymap, (8) patchmode, or (9) langmenu.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:39:00.870Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "OpenPKG-SA-2004.052", "tags": [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=110313588125609\u0026w=2" }, { "name": "GLSA-200412-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200412-10.xml" }, { "name": "vim-modeline-gain-privileges(18503)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18503" }, { "name": "FLSA:2343", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2343" }, { "name": "RHSA-2005:036", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-036.html" }, { "name": "RHSA-2005:010", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-010.html" }, { "name": "oval:org.mitre.oval:def:9571", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9571" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "VIM before 6.3 and gVim before 6.3 allow local users to execute arbitrary commands via a file containing a crafted modeline that is executed when the file is viewed using options such as (1) termcap, (2) printdevice, (3) titleold, (4) filetype, (5) syntax, (6) backupext, (7) keymap, (8) patchmode, or (9) langmenu." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "OpenPKG-SA-2004.052", "tags": [ "vendor-advisory", "x_refsource_OPENPKG" ], "url": "http://marc.info/?l=bugtraq\u0026m=110313588125609\u0026w=2" }, { "name": "GLSA-200412-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200412-10.xml" }, { "name": "vim-modeline-gain-privileges(18503)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18503" }, { "name": "FLSA:2343", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2343" }, { "name": "RHSA-2005:036", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-036.html" }, { "name": "RHSA-2005:010", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-010.html" }, { "name": "oval:org.mitre.oval:def:9571", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9571" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1138", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VIM before 6.3 and gVim before 6.3 allow local users to execute arbitrary commands via a file containing a crafted modeline that is executed when the file is viewed using options such as (1) termcap, (2) printdevice, (3) titleold, (4) filetype, (5) syntax, (6) backupext, (7) keymap, (8) patchmode, or (9) langmenu." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "OpenPKG-SA-2004.052", "refsource": "OPENPKG", "url": "http://marc.info/?l=bugtraq\u0026m=110313588125609\u0026w=2" }, { "name": "GLSA-200412-10", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200412-10.xml" }, { "name": "vim-modeline-gain-privileges(18503)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18503" }, { "name": "FLSA:2343", "refsource": "FEDORA", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2343" }, { "name": "RHSA-2005:036", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-036.html" }, { "name": "RHSA-2005:010", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-010.html" }, { "name": "oval:org.mitre.oval:def:9571", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9571" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1138", "datePublished": "2004-12-22T05:00:00", "dateReserved": "2004-12-06T00:00:00", "dateUpdated": "2024-08-08T00:39:00.870Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2001-06-18 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
vim (aka gvim) allows local users to modify files being edited by other users via a symlink attack on the backup and swap files, when the victim is editing the file in a world writable directory.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.calderasystems.com/support/security/advisories/CSSA-2001-014.0.txt | Patch, Vendor Advisory | |
cve@mitre.org | http://www.novell.com/linux/security/advisories/2001_012_vim.html | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/6628 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.calderasystems.com/support/security/advisories/CSSA-2001-014.0.txt | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2001_012_vim.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/6628 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vim_development_group | vim | 5.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vim_development_group:vim:5.7:*:*:*:*:*:*:*", "matchCriteriaId": "826F3339-8674-4A84-8EAC-17C884BBF723", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "vim (aka gvim) allows local users to modify files being edited by other users via a symlink attack on the backup and swap files, when the victim is editing the file in a world writable directory." } ], "id": "CVE-2001-0409", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-06-18T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.calderasystems.com/support/security/advisories/CSSA-2001-014.0.txt" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2001_012_vim.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6628" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.calderasystems.com/support/security/advisories/CSSA-2001-014.0.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2001_012_vim.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6628" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
VIM before 6.3 and gVim before 6.3 allow local users to execute arbitrary commands via a file containing a crafted modeline that is executed when the file is viewed using options such as (1) termcap, (2) printdevice, (3) titleold, (4) filetype, (5) syntax, (6) backupext, (7) keymap, (8) patchmode, or (9) langmenu.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://marc.info/?l=bugtraq&m=110313588125609&w=2 | ||
cve@mitre.org | http://www.gentoo.org/security/en/glsa/glsa-200412-10.xml | Patch, Vendor Advisory | |
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2005-010.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2005-036.html | ||
cve@mitre.org | https://bugzilla.fedora.us/show_bug.cgi?id=2343 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/18503 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9571 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=110313588125609&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.gentoo.org/security/en/glsa/glsa-200412-10.xml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2005-010.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2005-036.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.fedora.us/show_bug.cgi?id=2343 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/18503 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9571 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vim_development_group | vim | 5.0 | |
vim_development_group | vim | 5.1 | |
vim_development_group | vim | 5.2 | |
vim_development_group | vim | 5.3 | |
vim_development_group | vim | 5.4 | |
vim_development_group | vim | 5.5 | |
vim_development_group | vim | 5.6 | |
vim_development_group | vim | 5.7 | |
vim_development_group | vim | 5.8 | |
vim_development_group | vim | 6.0 | |
vim_development_group | vim | 6.1 | |
vim_development_group | vim | 6.2 | |
vim_development_group | vim | 6.3.011 | |
vim_development_group | vim | 6.3.025 | |
vim_development_group | vim | 6.3.030 | |
vim_development_group | vim | 6.3.044 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vim_development_group:vim:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B6461B4-AD69-4E54-901D-CB354FE9061C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D51F522E-E7A6-4861-BE54-C76B5D6062AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B5306C4-D4FA-48FE-B72A-8ED231DF283A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D8C559F4-82E7-4BFA-B1C2-AAD1EA790DE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "FD83B9EE-82FF-4DA5-8577-97CE226EFEAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "823E99C7-7020-48B2-8F71-6FA5A1097EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:5.6:*:*:*:*:*:*:*", "matchCriteriaId": "0A5B6675-BF67-434D-8D64-7BA6029A6BD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:5.7:*:*:*:*:*:*:*", "matchCriteriaId": "826F3339-8674-4A84-8EAC-17C884BBF723", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "2A7C7C4D-9E38-40A1-B003-939F46CD96CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3A7789A-E0B0-45EA-B05A-A5A1BF31A24D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6FF1779-4A0A-4E9E-94E1-5F7C4EF0555B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "B39392CC-FC4C-404E-BD18-8284F9C013CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:6.3.011:*:*:*:*:*:*:*", "matchCriteriaId": "C1B0FABE-75CE-4074-91FF-0D02DD0B6F1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:6.3.025:*:*:*:*:*:*:*", "matchCriteriaId": "6536006A-DB7A-4A50-9CF3-30EEAB59A83F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:6.3.030:*:*:*:*:*:*:*", "matchCriteriaId": "E7240424-79F1-41AA-AF22-C66F9F94B7E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:6.3.044:*:*:*:*:*:*:*", "matchCriteriaId": "E1BA3F17-DA8F-4E4F-B654-AEBED68B43B8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VIM before 6.3 and gVim before 6.3 allow local users to execute arbitrary commands via a file containing a crafted modeline that is executed when the file is viewed using options such as (1) termcap, (2) printdevice, (3) titleold, (4) filetype, (5) syntax, (6) backupext, (7) keymap, (8) patchmode, or (9) langmenu." } ], "id": "CVE-2004-1138", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-01-10T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=110313588125609\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200412-10.xml" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2005-010.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2005-036.html" }, { "source": "cve@mitre.org", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2343" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18503" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9571" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=110313588125609\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200412-10.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2005-010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2005-036.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2343" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18503" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9571" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-07-26 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
vim 6.3 before 6.3.082, with modelines enabled, allows external user-assisted attackers to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.grok.org.uk/pipermail/full-disclosure/2005-July/035402.html | Exploit, Patch, Vendor Advisory | |
cve@mitre.org | http://www.guninski.com/where_do_you_want_billg_to_go_today_5.html | Exploit, Patch, Vendor Advisory | |
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2005-745.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/14374 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11302 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.grok.org.uk/pipermail/full-disclosure/2005-July/035402.html | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.guninski.com/where_do_you_want_billg_to_go_today_5.html | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2005-745.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/14374 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11302 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vim_development_group | vim | 6.3 | |
vim_development_group | vim | 6.3.011 | |
vim_development_group | vim | 6.3.025 | |
vim_development_group | vim | 6.3.030 | |
vim_development_group | vim | 6.3.044 | |
vim_development_group | vim | 6.3.081 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vim_development_group:vim:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "27672CCF-59C2-45D8-8B82-822040DDAE34", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:6.3.011:*:*:*:*:*:*:*", "matchCriteriaId": "C1B0FABE-75CE-4074-91FF-0D02DD0B6F1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:6.3.025:*:*:*:*:*:*:*", "matchCriteriaId": "6536006A-DB7A-4A50-9CF3-30EEAB59A83F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:6.3.030:*:*:*:*:*:*:*", "matchCriteriaId": "E7240424-79F1-41AA-AF22-C66F9F94B7E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:6.3.044:*:*:*:*:*:*:*", "matchCriteriaId": "E1BA3F17-DA8F-4E4F-B654-AEBED68B43B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:6.3.081:*:*:*:*:*:*:*", "matchCriteriaId": "B414DCD0-4413-4190-92E0-B206B78752AF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "vim 6.3 before 6.3.082, with modelines enabled, allows external user-assisted attackers to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels." }, { "lang": "es", "value": "vim 6.3 anterior a la 6.3.082, con \"modelines\" habilitado, permite que atacantes remotos con la implicaci\u00f3n del usuario que ejecuten comandos arbitrarios mediante metacaracteres de shell en los comandos \"glob\" o \"expand\" de una expresi\u00f3n \"foldexpr\"." } ], "id": "CVE-2005-2368", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2005-07-26T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-July/035402.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.guninski.com/where_do_you_want_billg_to_go_today_5.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2005-745.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/14374" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-July/035402.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.guninski.com/where_do_you_want_billg_to_go_today_5.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2005-745.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/14374" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11302" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-01-13 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The (1) tcltags or (2) vimspell.sh scripts in vim 6.3 allow local users to overwrite or create arbitrary files via a symlink attack on temporary files.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://marc.info/?l=bugtraq&m=110608387001863&w=2 | ||
cve@mitre.org | http://secunia.com/advisories/13841/ | Patch, Vendor Advisory | |
cve@mitre.org | http://securitytracker.com/id?1012938 | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2005-036.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2005-122.html | Patch, Vendor Advisory | |
cve@mitre.org | https://bugzilla.fedora.us/show_bug.cgi?id=2343 | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/18870 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9402 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=110608387001863&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/13841/ | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1012938 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2005-036.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2005-122.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.fedora.us/show_bug.cgi?id=2343 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/18870 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9402 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vim_development_group | vim | 6.3.011 | |
vim_development_group | vim | 6.3.025 | |
vim_development_group | vim | 6.3.030 | |
vim_development_group | vim | 6.3.044 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vim_development_group:vim:6.3.011:*:*:*:*:*:*:*", "matchCriteriaId": "C1B0FABE-75CE-4074-91FF-0D02DD0B6F1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:6.3.025:*:*:*:*:*:*:*", "matchCriteriaId": "6536006A-DB7A-4A50-9CF3-30EEAB59A83F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:6.3.030:*:*:*:*:*:*:*", "matchCriteriaId": "E7240424-79F1-41AA-AF22-C66F9F94B7E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:6.3.044:*:*:*:*:*:*:*", "matchCriteriaId": "E1BA3F17-DA8F-4E4F-B654-AEBED68B43B8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The (1) tcltags or (2) vimspell.sh scripts in vim 6.3 allow local users to overwrite or create arbitrary files via a symlink attack on temporary files." } ], "id": "CVE-2005-0069", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-01-13T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=110608387001863\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/13841/" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1012938" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-036.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-122.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2343" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18870" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9402" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=110608387001863\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/13841/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1012938" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-036.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-122.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2343" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18870" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9402" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-12-23 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000812 | ||
cve@mitre.org | http://lists.grok.org.uk/pipermail/full-disclosure/2002-December/002948.html | ||
cve@mitre.org | http://marc.info/?l=bugtraq&m=108077992208690&w=2 | ||
cve@mitre.org | http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/55700 | ||
cve@mitre.org | http://www.guninski.com/vim1.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:012 | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2002-297.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2002-302.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/6384 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/10835 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000812 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.grok.org.uk/pipermail/full-disclosure/2002-December/002948.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=108077992208690&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/55700 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.guninski.com/vim1.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:012 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2002-297.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2002-302.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/6384 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/10835 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vim_development_group | vim | 5.0 | |
vim_development_group | vim | 5.1 | |
vim_development_group | vim | 5.2 | |
vim_development_group | vim | 5.3 | |
vim_development_group | vim | 5.4 | |
vim_development_group | vim | 5.5 | |
vim_development_group | vim | 5.6 | |
vim_development_group | vim | 5.7 | |
vim_development_group | vim | 5.8 | |
vim_development_group | vim | 6.0 | |
vim_development_group | vim | 6.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vim_development_group:vim:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B6461B4-AD69-4E54-901D-CB354FE9061C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D51F522E-E7A6-4861-BE54-C76B5D6062AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B5306C4-D4FA-48FE-B72A-8ED231DF283A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D8C559F4-82E7-4BFA-B1C2-AAD1EA790DE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "FD83B9EE-82FF-4DA5-8577-97CE226EFEAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "823E99C7-7020-48B2-8F71-6FA5A1097EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:5.6:*:*:*:*:*:*:*", "matchCriteriaId": "0A5B6675-BF67-434D-8D64-7BA6029A6BD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:5.7:*:*:*:*:*:*:*", "matchCriteriaId": "826F3339-8674-4A84-8EAC-17C884BBF723", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "2A7C7C4D-9E38-40A1-B003-939F46CD96CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3A7789A-E0B0-45EA-B05A-A5A1BF31A24D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6FF1779-4A0A-4E9E-94E1-5F7C4EF0555B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt." }, { "lang": "es", "value": "vim 6.0 y 6.1 y posiblemente otras versiones, permite a atacantes ejecutar comandos arbitrarios usando la caracter\u00edstica libcall en lineas de modo, que no son apantalladas si no que pueden ser ejecutadas cuando vim es usado como editor para otros productos como mutt." } ], "id": "CVE-2002-1377", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-12-23T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000812" }, { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2002-December/002948.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=108077992208690\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/55700" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.guninski.com/vim1.html" }, { "source": "cve@mitre.org", "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:012" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-297.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2002-302.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/6384" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10835" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000812" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2002-December/002948.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=108077992208690\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/55700" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.guninski.com/vim1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-297.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2002-302.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/6384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10835" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-06-18 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://marc.info/?l=bugtraq&m=98593106111968&w=2 | ||
cve@mitre.org | http://www.calderasystems.com/support/security/advisories/CSSA-2001-014.0.txt | Patch, Vendor Advisory | |
cve@mitre.org | http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-035.php3 | ||
cve@mitre.org | http://www.novell.com/linux/security/advisories/2001_012_vim.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2001-008.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/2510 | Patch, Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/6259 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=98593106111968&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.calderasystems.com/support/security/advisories/CSSA-2001-014.0.txt | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-035.php3 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2001_012_vim.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2001-008.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/2510 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/6259 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vim_development_group | vim | 5.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vim_development_group:vim:5.7:*:*:*:*:*:*:*", "matchCriteriaId": "826F3339-8674-4A84-8EAC-17C884BBF723", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes." } ], "id": "CVE-2001-0408", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2001-06-18T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=98593106111968\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.calderasystems.com/support/security/advisories/CSSA-2001-014.0.txt" }, { "source": "cve@mitre.org", "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-035.php3" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2001_012_vim.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-008.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2510" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6259" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=98593106111968\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.calderasystems.com/support/security/advisories/CSSA-2001-014.0.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-035.php3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2001_012_vim.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2510" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6259" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-07-31 10:17
Modified
2025-04-09 00:30
Severity ?
Summary
Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the helptags command.
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | ftp://ftp.vim.org/pub/vim/patches/7.1/7.1.039 | Patch | |
PSIRT-CNA@flexerasoftware.com | http://secunia.com/advisories/25941 | Patch, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://secunia.com/advisories/26285 | ||
PSIRT-CNA@flexerasoftware.com | http://secunia.com/advisories/26522 | ||
PSIRT-CNA@flexerasoftware.com | http://secunia.com/advisories/26594 | ||
PSIRT-CNA@flexerasoftware.com | http://secunia.com/advisories/26653 | ||
PSIRT-CNA@flexerasoftware.com | http://secunia.com/advisories/26674 | ||
PSIRT-CNA@flexerasoftware.com | http://secunia.com/advisories/26822 | ||
PSIRT-CNA@flexerasoftware.com | http://secunia.com/advisories/32858 | ||
PSIRT-CNA@flexerasoftware.com | http://secunia.com/advisories/33410 | ||
PSIRT-CNA@flexerasoftware.com | http://secunia.com/secunia_research/2007-66/advisory/ | Patch, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm | ||
PSIRT-CNA@flexerasoftware.com | http://www.attrition.org/pipermail/vim/2007-August/001770.html | ||
PSIRT-CNA@flexerasoftware.com | http://www.debian.org/security/2007/dsa-1364 | ||
PSIRT-CNA@flexerasoftware.com | http://www.mandriva.com/security/advisories?name=MDKSA-2007:168 | ||
PSIRT-CNA@flexerasoftware.com | http://www.mandriva.com/security/advisories?name=MDVSA-2008:236 | ||
PSIRT-CNA@flexerasoftware.com | http://www.novell.com/linux/security/advisories/2007_18_sr.html | ||
PSIRT-CNA@flexerasoftware.com | http://www.redhat.com/support/errata/RHSA-2008-0580.html | ||
PSIRT-CNA@flexerasoftware.com | http://www.redhat.com/support/errata/RHSA-2008-0617.html | ||
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/archive/1/475076/100/100/threaded | ||
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/archive/1/502322/100/0/threaded | ||
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/bid/25095 | Patch | |
PSIRT-CNA@flexerasoftware.com | http://www.trustix.org/errata/2007/0026/ | ||
PSIRT-CNA@flexerasoftware.com | http://www.ubuntu.com/usn/usn-505-1 | ||
PSIRT-CNA@flexerasoftware.com | http://www.vmware.com/security/advisories/VMSA-2009-0004.html | ||
PSIRT-CNA@flexerasoftware.com | http://www.vupen.com/english/advisories/2007/2687 | ||
PSIRT-CNA@flexerasoftware.com | http://www.vupen.com/english/advisories/2009/0033 | ||
PSIRT-CNA@flexerasoftware.com | http://www.vupen.com/english/advisories/2009/0904 | ||
PSIRT-CNA@flexerasoftware.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/35655 | ||
PSIRT-CNA@flexerasoftware.com | https://issues.rpath.com/browse/RPL-1595 | ||
PSIRT-CNA@flexerasoftware.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11549 | ||
PSIRT-CNA@flexerasoftware.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6463 | ||
af854a3a-2127-422b-91ae-364da2661108 | ftp://ftp.vim.org/pub/vim/patches/7.1/7.1.039 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25941 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26285 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26522 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26594 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26653 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26674 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26822 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32858 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33410 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2007-66/advisory/ | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.attrition.org/pipermail/vim/2007-August/001770.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2007/dsa-1364 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:168 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:236 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2007_18_sr.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0580.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0617.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/475076/100/100/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/502322/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/25095 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.trustix.org/errata/2007/0026/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-505-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2009-0004.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/2687 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/0033 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/0904 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/35655 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-1595 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11549 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6463 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vim_development_group | vim | * | |
vim_development_group | vim | 7.0 | |
vim_development_group | vim | 7.1 | |
vim_development_group | vim | 7.1.38 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vim_development_group:vim:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4F93B06-3F84-4C05-9C2C-E5BC29990796", "versionEndIncluding": "6.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A9EFB35-7AFD-4306-BC1C-EB5C984F4B3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "9BCF512E-8CAC-4001-B91C-E61569E0ED25", "vulnerable": true }, { "criteria": "cpe:2.3:a:vim_development_group:vim:7.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "2598FB8B-1D83-42E8-8B3C-C042150F8AF4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the helptags command." }, { "lang": "es", "value": "Vulnerabilidad de cadena de formato en la funci\u00f3n helptags_one de src/ex_cmds.c en Vim 6.4 y anteriores, y 7.x hasta 7.1, permite a atacantes remotos con la intervenci\u00f3n del usuario ejecutar c\u00f3digo de su elecci\u00f3n mediante especificadores de cadena de formato en una etiqueta help-tags de un archivo de ayuda, relacionado con el comando helptags." } ], "id": "CVE-2007-2953", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-07-31T10:17:00.000", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch" ], "url": "ftp://ftp.vim.org/pub/vim/patches/7.1/7.1.039" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/25941" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://secunia.com/advisories/26285" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://secunia.com/advisories/26522" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://secunia.com/advisories/26594" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://secunia.com/advisories/26653" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://secunia.com/advisories/26674" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://secunia.com/advisories/26822" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://secunia.com/advisories/32858" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://secunia.com/advisories/33410" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2007-66/advisory/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.attrition.org/pipermail/vim/2007-August/001770.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.debian.org/security/2007/dsa-1364" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:168" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:236" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.novell.com/linux/security/advisories/2007_18_sr.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.redhat.com/support/errata/RHSA-2008-0580.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.redhat.com/support/errata/RHSA-2008-0617.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/475076/100/100/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/502322/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25095" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.trustix.org/errata/2007/0026/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.ubuntu.com/usn/usn-505-1" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0004.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.vupen.com/english/advisories/2007/2687" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.vupen.com/english/advisories/2009/0033" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.vupen.com/english/advisories/2009/0904" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35655" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://issues.rpath.com/browse/RPL-1595" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11549" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6463" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "ftp://ftp.vim.org/pub/vim/patches/7.1/7.1.039" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/25941" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26522" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26594" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26674" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26822" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/32858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/33410" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2007-66/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.attrition.org/pipermail/vim/2007-August/001770.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2007/dsa-1364" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:168" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2007_18_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0580.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0617.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/475076/100/100/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/502322/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25095" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.trustix.org/errata/2007/0026/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-505-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/0033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/0904" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35655" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-1595" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11549" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6463" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vendorComments": [ { "comment": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248542\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/\n", "lastModified": "2007-08-06T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-05-02 21:19
Modified
2025-04-09 00:30
Severity ?
Summary
The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://attrition.org/pipermail/vim/2007-May/001614.html | ||
secalert@redhat.com | http://marc.info/?l=vim-dev&m=117762581821298&w=2 | ||
secalert@redhat.com | http://marc.info/?l=vim-dev&m=117778983714029&w=2 | Exploit | |
secalert@redhat.com | http://osvdb.org/36250 | ||
secalert@redhat.com | http://secunia.com/advisories/25024 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/25159 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/25182 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/25255 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/25367 | ||
secalert@redhat.com | http://secunia.com/advisories/25432 | ||
secalert@redhat.com | http://secunia.com/advisories/26653 | ||
secalert@redhat.com | http://tech.groups.yahoo.com/group/vimannounce/message/178 | ||
secalert@redhat.com | http://tech.groups.yahoo.com/group/vimdev/message/46627 | ||
secalert@redhat.com | http://tech.groups.yahoo.com/group/vimdev/message/46645 | ||
secalert@redhat.com | http://tech.groups.yahoo.com/group/vimdev/message/46658 | ||
secalert@redhat.com | http://www.attrition.org/pipermail/vim/2007-August/001770.html | ||
secalert@redhat.com | http://www.debian.org/security/2007/dsa-1364 | ||
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDKSA-2007:101 | ||
secalert@redhat.com | http://www.novell.com/linux/security/advisories/2007_12_sr.html | ||
secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2007-0346.html | ||
secalert@redhat.com | http://www.securityfocus.com/archive/1/467202/100/0/threaded | ||
secalert@redhat.com | http://www.securityfocus.com/bid/23725 | ||
secalert@redhat.com | http://www.securitytracker.com/id?1018035 | ||
secalert@redhat.com | http://www.trustix.org/errata/2007/0017/ | ||
secalert@redhat.com | http://www.ubuntu.com/usn/usn-463-1 | ||
secalert@redhat.com | http://www.vim.org/news/news.php | ||
secalert@redhat.com | http://www.vupen.com/english/advisories/2007/1599 | ||
secalert@redhat.com | https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=238259 | ||
secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/34012 | ||
secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9876 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://attrition.org/pipermail/vim/2007-May/001614.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=vim-dev&m=117762581821298&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=vim-dev&m=117778983714029&w=2 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/36250 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25024 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25159 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25182 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25255 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25367 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25432 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26653 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://tech.groups.yahoo.com/group/vimannounce/message/178 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://tech.groups.yahoo.com/group/vimdev/message/46627 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://tech.groups.yahoo.com/group/vimdev/message/46645 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://tech.groups.yahoo.com/group/vimdev/message/46658 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.attrition.org/pipermail/vim/2007-August/001770.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2007/dsa-1364 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:101 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2007_12_sr.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-0346.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/467202/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/23725 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1018035 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.trustix.org/errata/2007/0017/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-463-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vim.org/news/news.php | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/1599 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=238259 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/34012 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9876 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
foresight_linux | foresight_linux | 1.1 | |
vim_development_group | vim | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:foresight_linux:foresight_linux:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "52F637E4-13E6-4B05-9F8A-A1D408ED4CF2", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:vim_development_group:vim:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A9EFB35-7AFD-4306-BC1C-EB5C984F4B3C", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines." }, { "lang": "es", "value": "El sandbox para el vim permite funciones peligrosas como (1) writefile, (2) feedkeys, y (3) system, lo que permite a atacantes con la intervenci\u00f3n del usuario la ejecuci\u00f3n de comandos shell y escribir ficheros a trav\u00e9s de modelines." } ], "evaluatorImpact": "Successful exploitation requires that the \"modelines\" option is enabled and the user is tricked into opening a malicious file.", "evaluatorSolution": "The vendor has addressed this issue with the following patches:\r\n\r\nVIM Development Group VIM 7.0-\r\n\r\nVIM Development Group patch 7.0.234\r\nftp://ftp.vim.org/pub/vim/patches/7.0/7.0.234\r\n\r\nVIM Development Group patch 7.0.235\r\nftp://ftp.vim.org/pub/vim/patches/7.0/7.0.235\r\n", "id": "CVE-2007-2438", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-05-02T21:19:00.000", "references": [ { "source": "secalert@redhat.com", "url": "http://attrition.org/pipermail/vim/2007-May/001614.html" }, { "source": "secalert@redhat.com", "url": "http://marc.info/?l=vim-dev\u0026m=117762581821298\u0026w=2" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://marc.info/?l=vim-dev\u0026m=117778983714029\u0026w=2" }, { "source": "secalert@redhat.com", "url": "http://osvdb.org/36250" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25024" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25159" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25182" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25255" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/25367" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/25432" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/26653" }, { "source": "secalert@redhat.com", "url": "http://tech.groups.yahoo.com/group/vimannounce/message/178" }, { "source": "secalert@redhat.com", "url": "http://tech.groups.yahoo.com/group/vimdev/message/46627" }, { "source": "secalert@redhat.com", "url": "http://tech.groups.yahoo.com/group/vimdev/message/46645" }, { "source": "secalert@redhat.com", "url": "http://tech.groups.yahoo.com/group/vimdev/message/46658" }, { "source": "secalert@redhat.com", "url": "http://www.attrition.org/pipermail/vim/2007-August/001770.html" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2007/dsa-1364" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:101" }, { "source": "secalert@redhat.com", "url": "http://www.novell.com/linux/security/advisories/2007_12_sr.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2007-0346.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/467202/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/23725" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1018035" }, { "source": "secalert@redhat.com", "url": "http://www.trustix.org/errata/2007/0017/" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/usn-463-1" }, { "source": "secalert@redhat.com", "url": "http://www.vim.org/news/news.php" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2007/1599" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=238259" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34012" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://attrition.org/pipermail/vim/2007-May/001614.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=vim-dev\u0026m=117762581821298\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://marc.info/?l=vim-dev\u0026m=117778983714029\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/36250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25024" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25159" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25255" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/25367" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/25432" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tech.groups.yahoo.com/group/vimannounce/message/178" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tech.groups.yahoo.com/group/vimdev/message/46627" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tech.groups.yahoo.com/group/vimdev/message/46645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tech.groups.yahoo.com/group/vimdev/message/46658" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.attrition.org/pipermail/vim/2007-August/001770.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2007/dsa-1364" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2007_12_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-0346.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/467202/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/23725" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018035" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.trustix.org/errata/2007/0017/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-463-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vim.org/news/news.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/1599" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=238259" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9876" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }