First published: Tue Jul 26 2005(Updated: )
vim 6.3 before 6.3.082, with modelines enabled, allows external user-assisted attackers to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Vim by Vim Development Group | =6.3 | |
Vim by Vim Development Group | =6.3.011 | |
Vim by Vim Development Group | =6.3.081 | |
Vim by Vim Development Group | =6.3.025 | |
Vim by Vim Development Group | =6.3.044 | |
Vim by Vim Development Group | =6.3.030 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2368 has a moderate severity as it allows external attackers to execute arbitrary commands under certain conditions.
CVE-2005-2368 affects Vim versions 6.3 and earlier up to 6.3.081.
You can mitigate CVE-2005-2368 by disabling modelines in your Vim configuration or upgrading to a patched version of Vim.
CVE-2005-2368 allows user-assisted attackers to execute arbitrary shell commands via specially crafted Vim scripts.
CVE-2005-2368 is not a zero-day vulnerability as it was disclosed in 2005, and fixes are available.