vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.
Advisories
Source ID Title
EUVD EUVD EUVD-2002-1361 vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-08T03:19:28.975Z

Reserved: 2002-12-16T00:00:00

Link: CVE-2002-1377

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2002-12-23T05:00:00.000

Modified: 2025-04-03T01:03:51.193

Link: CVE-2002-1377

cve-icon Redhat

Severity : Important

Publid Date: 2002-12-12T00:00:00Z

Links: CVE-2002-1377 - Bugzilla

cve-icon OpenCVE Enrichment

No data.