CVE-2002-1377

vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vim_development_group:vim:5.0:*:*:*:*:*:*:*
cpe:2.3:a:vim_development_group:vim:5.1:*:*:*:*:*:*:*
cpe:2.3:a:vim_development_group:vim:5.2:*:*:*:*:*:*:*
cpe:2.3:a:vim_development_group:vim:5.3:*:*:*:*:*:*:*
cpe:2.3:a:vim_development_group:vim:5.4:*:*:*:*:*:*:*
cpe:2.3:a:vim_development_group:vim:5.5:*:*:*:*:*:*:*
cpe:2.3:a:vim_development_group:vim:5.6:*:*:*:*:*:*:*
cpe:2.3:a:vim_development_group:vim:5.7:*:*:*:*:*:*:*
cpe:2.3:a:vim_development_group:vim:5.8:*:*:*:*:*:*:*
cpe:2.3:a:vim_development_group:vim:6.0:*:*:*:*:*:*:*
cpe:2.3:a:vim_development_group:vim:6.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2002-12-23 05:00

Updated : 2024-02-04 16:31


NVD link : CVE-2002-1377

Mitre link : CVE-2002-1377

CVE.ORG link : CVE-2002-1377


JSON object : View

Products Affected

vim_development_group

  • vim