First published: Wed Jun 05 2019(Updated: )
getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Vim Vim | <8.1.1365 | |
Neovim Neovim | <0.3.6 | |
redhat/vim | <8.1.1365 | 8.1.1365 |
redhat/neovim | <0.3.6 | 0.3.6 |
debian/neovim | 0.4.4-1 0.7.2-7 0.9.5-7 | |
debian/vim | 2:8.2.2434-3+deb11u1 2:9.0.1378-2 2:9.1.0709-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12735 has a critical severity rating due to its potential to allow remote command execution.
To fix CVE-2019-12735, upgrade Vim to version 8.1.1365 or later, or Neovim to version 0.3.6 or later.
Users of Vim versions prior to 8.1.1365 and Neovim versions prior to 0.3.6 are affected by CVE-2019-12735.
CVE-2019-12735 allows remote attackers to execute arbitrary operating system commands via the :source! command in a modeline.
Yes, CVE-2019-12735 is a known vulnerability that has been publicly disclosed and documented.