First published: Thu May 28 2020(Updated: )
In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).
Credit: Guilherme de Almeida Suckevicz cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/vim | 2:8.2.2434-3+deb11u1 2:9.0.1378-2 2:9.1.0709-2 | |
macOS Catalina | <10.15.6 | 10.15.6 |
macOS Mojave | ||
macOS High Sierra | ||
Vim | <8.1.0881 | |
Debian GNU/Linux | =9.0 | |
openSUSE | =15.1 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Apple iOS and macOS | =10.13.6 | |
Apple iOS and macOS | =10.14.6 | |
StarWind Command Center | =2-build_6003 | |
StarWindSoftware SAN & NAS | =1.0-update_1 | |
Debian | =9.0 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-20807 is a vulnerability in Vim that was addressed with improved checks.
CVE-2019-20807 affects macOS Catalina 10.15.6, Mojave, and High Sierra.
To fix CVE-2019-20807, update your macOS to the latest available version.
You can find more information about CVE-2019-20807 on the Apple support website.