CVE-2019-12735

Related Vulnerabilities: CVE-2019-12735  

Impact: Moderate Public Date: 2019-06-05 CWE: CWE-94 Bugzilla: 1718308: CVE-2019-12735 vim/neovim: arbitrary command execution in getchar.c getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.

The MITRE CVE dictionary describes this issue as:

getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.

Find out more about CVE-2019-12735 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 5.3
CVSS3 Base Metrics CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Attack Vector Local
Attack Complexity Low
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality Low
Integrity Impact Low
Availability Impact Low

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 8 vim Under investigation
Red Hat Enterprise Linux 7 vim Under investigation
Red Hat Enterprise Linux 6 vim Under investigation
Red Hat Enterprise Linux 5 vim Under investigation