Описание
vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.
A vulnerability was found in vim in how certain modeline options were treated. An attacker could craft a file that, when opened in vim with modelines enabled, could execute arbitrary commands with privileges of the user running vim.
Меры по смягчению последствий
Disabling modeline support in .vimrc by adding "set nomodeline" will prevent exploitation of this flaw. By default, modeline is enabled for ordinary users but disabled for root.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | vim | Will not fix | ||
Red Hat Enterprise Linux 6 | vim | Fixed | RHSA-2016:2972 | 21.12.2016 |
Red Hat Enterprise Linux 7 | vim | Fixed | RHSA-2016:2972 | 21.12.2016 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.5 High
CVSS3
6.8 Medium
CVSS2
Связанные уязвимости
vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.
vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.
vim before patch 8.0.0056 does not properly validate values for the 'f ...
EPSS
7.5 High
CVSS3
6.8 Medium
CVSS2