Description
vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.
Published: 2004-09-01
Score: 4.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2002-1361 vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.
History

No history.

Subscriptions

Redhat Enterprise Linux Linux
Vim Development Group Vim
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-08T03:19:28.975Z

Reserved: 2002-12-16T00:00:00.000Z

Link: CVE-2002-1377

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2002-12-23T05:00:00.000

Modified: 2026-04-16T00:27:16.627

Link: CVE-2002-1377

cve-icon Redhat

Severity : Important

Publid Date: 2002-12-12T00:00:00Z

Links: CVE-2002-1377 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses