First published: Mon Jan 26 2009(Updated: )
Untrusted search path vulnerability in the of Vim allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to an erroneous setting of sys.path by the PySys_SetArgv function. References (test case, PoC): <a href="http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html">http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html</a> Proposed patch: The Debian patch for similar dia's Python related issue, available at: <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=pythonpath.diff;att=1;bug=504251">http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=pythonpath.diff;att=1;bug=504251</a> should be sufficient to resolve this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Vim |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-481565 is considered high due to the potential for local users to execute arbitrary code.
To fix REDHAT-BUG-481565, update Vim to the latest patched version that addresses the untrusted search path vulnerability.
The vulnerability REDHAT-BUG-481565 affects all versions of Vim that are configured to allow untrusted Python files.
Failing to address REDHAT-BUG-481565 could lead to the execution of malicious code by local users, compromising system integrity.
A temporary workaround for REDHAT-BUG-481565 includes avoiding the use of Vim in directories containing untrusted Python files.