First published: Wed Aug 06 2008(Updated: )
Untrusted search path vulnerability in src/if_python.c in the Python interface in Vim before 7.2.045 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983), as demonstrated by an erroneous search path for plugin/bike.vim in bicyclerepair.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Vim Vim | =5.7 | |
Vim Vim | =6.4 | |
Vim Vim | =3.0 | |
Vim Vim | =1.22 | |
Vim Vim | =6.3 | |
Vim Vim | =5.4 | |
Vim Vim | =7.1 | |
Vim Vim | =7.0 | |
Vim Vim | <=7.2 | |
Vim Vim | =5.2 | |
Vim Vim | =5.3 | |
Vim Vim | =5.5 | |
Vim Vim | =6.2 | |
Vim Vim | =1.0 | |
Vim Vim | =5.8 | |
Vim Vim | =6.0 | |
Vim Vim | =5.6 | |
Vim Vim | =6.1 | |
Vim Vim | =5.1 | |
Vim Vim | =5.0 | |
Vim Vim | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.