First published: Mon Dec 23 2002(Updated: )
vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Vim by Vim Development Group | =6.0 | |
Vim by Vim Development Group | =5.4 | |
Vim by Vim Development Group | =5.6 | |
Vim by Vim Development Group | =5.3 | |
Vim by Vim Development Group | =5.8 | |
Vim by Vim Development Group | =5.0 | |
Vim by Vim Development Group | =5.5 | |
Vim by Vim Development Group | =5.1 | |
Vim by Vim Development Group | =5.2 | |
Vim by Vim Development Group | =5.7 | |
Vim by Vim Development Group | =6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1377 is considered a critical vulnerability due to its ability to allow attackers to execute arbitrary commands.
To fix CVE-2002-1377, update Vim to version 6.2 or later, where this vulnerability is addressed.
CVE-2002-1377 affects Vim versions 6.0 and 6.1, as well as prior versions like 5.0 through 5.8.
CVE-2002-1377 can be exploited when Vim is used to edit a malicious file containing certain modelines.
The impact of CVE-2002-1377 can lead to unauthorized command execution, compromising system security and user data.