First published: Wed Dec 22 2004(Updated: )
VIM before 6.3 and gVim before 6.3 allow local users to execute arbitrary commands via a file containing a crafted modeline that is executed when the file is viewed using options such as (1) termcap, (2) printdevice, (3) titleold, (4) filetype, (5) syntax, (6) backupext, (7) keymap, (8) patchmode, or (9) langmenu.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Vim Development Group Vim | =6.0 | |
Vim Development Group Vim | =5.4 | |
Vim Development Group Vim | =5.6 | |
Vim Development Group Vim | =5.3 | |
Vim Development Group Vim | =5.8 | |
Vim Development Group Vim | =5.0 | |
Vim Development Group Vim | =6.3.011 | |
Vim Development Group Vim | =5.5 | |
Vim Development Group Vim | =6.3.025 | |
Vim Development Group Vim | =6.3.044 | |
Vim Development Group Vim | =5.1 | |
Vim Development Group Vim | =5.2 | |
Vim Development Group Vim | =6.2 | |
Vim Development Group Vim | =5.7 | |
Vim Development Group Vim | =6.1 | |
Vim Development Group Vim | =6.3.030 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.