7.2
CVSSv2

CVE-2004-1138

Published: 10/01/2005 Updated: 11/10/2017
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

VIM prior to 6.3 and gVim prior to 6.3 allow local users to execute arbitrary commands via a file containing a crafted modeline that is executed when the file is viewed using options such as (1) termcap, (2) printdevice, (3) titleold, (4) filetype, (5) syntax, (6) backupext, (7) keymap, (8) patchmode, or (9) langmenu.

Vulnerable Product Search on Vulmon Subscribe to Product

vim development group vim 5.6

vim development group vim 5.7

vim development group vim 5.8

vim development group vim 6.3.044

vim development group vim 5.2

vim development group vim 5.3

vim development group vim 6.2

vim development group vim 6.3.011

vim development group vim 5.4

vim development group vim 5.5

vim development group vim 6.3.025

vim development group vim 6.3.030

vim development group vim 5.0

vim development group vim 5.1

vim development group vim 6.0

vim development group vim 6.1

Vendor Advisories

Ciaran McCreesh found several vulnerabilities related to the use of options in Vim modeline commands, such as ‘termcap’, ‘printdevice’, ‘titleold’, ‘filetype’, ‘syntax’, ‘backupext’, ‘keymap’, ‘patchmode’, and ‘langmenu’ ...
Synopsis vim security update Type/Severity Security Advisory: Low Topic Updated vim packages that fix security vulnerabilities are now availablefor Red Hat Enterprise Linux 4This update has been rated as having low security impact by the Red HatSecurity Response Team Description VIM (Vi I ...
Synopsis vim security update Type/Severity Security Advisory: Low Topic Updated vim packages that fix a modeline vulnerability are now available Description VIM (Vi IMproved) is an updated and improved version of the vi screen-basededitorCiaran McCreesh discovered a modeline vulnerability ...