7.6
CVSSv2

CVE-2007-2438

Published: 02/05/2007 Updated: 16/10/2018
CVSS v2 Base Score: 7.6 | Impact Score: 10 | Exploitability Score: 4.9
VMScore: 677
Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted malicious users to execute shell commands and write files via modelines.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vim_development_group vim 7.0

Vendor Advisories

Debian Bug report logs - #435401 sandbox for vim allows attackers to execute shell commands and write files via modelines Package: vim; Maintainer for vim is Debian Vim Maintainers <team+vim@trackerdebianorg>; Source for vim is src:vim (PTS, buildd, popcon) Reported by: Steffen Joeris <steffenjoeris@skolelinuxde> ...
Tomas Golembiovsky discovered that some vim commands were accidentally allowed in modelines By tricking a user into opening a specially crafted file in vim, an attacker could execute arbitrary code with user privileges ...
Several vulnerabilities have been discovered in the vim editor The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-2953 Ulf Härnhammar discovered that a format string flaw in helptags_one() from src/ex_cmdsc (triggered through the helptags command) can lead to the execution of arbitrary code ...

Github Repositories

My Vim configuration

vimfiles This is my Vim configuration It used to be worse It aims to be compatible with a wide range of Vim versions (back to Vim 72 with the "tiny" feature set), providing reasonable fallback behavior whenever functionality is unavailable Here begins a series of notes to myself Installation A Unix-like operating system and Bourne-adjacent shell are assumed Err

Vim IDE 配置

Windows10 Vim Ide 配置 本例子是在Windows10 上配置的,其他系统是否可用请自行尝试。安装路径建议使用默认路径即可。 Github 其他的资源可以再分享链接下载。这边只放了一个 _vimrc 文件。 懒人版 百度云链接: panbaiducom/s/1kEeCKsSNScaw4-ZFT_VWUQ 密码: 0git 下载完成以后,先安装三个exe文件,

📚 Encyclopedia

Список полезных команд Linux Вывод версии дистрибутива Дерево процессов Поиск процесса занимающего порт Фоновый процесс Работа с фоновыми процессами Ctrl + Z - приостановить и свернуть задачу Добавление для ${

References

NVD-CWE-Otherhttp://marc.info/?l=vim-dev&m=117762581821298&w=2http://marc.info/?l=vim-dev&m=117778983714029&w=2http://tech.groups.yahoo.com/group/vimdev/message/46627http://tech.groups.yahoo.com/group/vimdev/message/46658http://tech.groups.yahoo.com/group/vimdev/message/46645https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=238259http://www.securityfocus.com/bid/23725http://secunia.com/advisories/25024http://www.redhat.com/support/errata/RHSA-2007-0346.htmlhttp://www.securitytracker.com/id?1018035http://secunia.com/advisories/25159http://secunia.com/advisories/25182http://www.trustix.org/errata/2007/0017/http://secunia.com/advisories/25255http://tech.groups.yahoo.com/group/vimannounce/message/178http://www.vim.org/news/news.phphttp://www.debian.org/security/2007/dsa-1364http://www.mandriva.com/security/advisories?name=MDKSA-2007:101http://www.novell.com/linux/security/advisories/2007_12_sr.htmlhttp://www.ubuntu.com/usn/usn-463-1http://attrition.org/pipermail/vim/2007-May/001614.htmlhttp://www.attrition.org/pipermail/vim/2007-August/001770.htmlhttp://secunia.com/advisories/25367http://secunia.com/advisories/25432http://secunia.com/advisories/26653http://www.vupen.com/english/advisories/2007/1599http://osvdb.org/36250https://exchange.xforce.ibmcloud.com/vulnerabilities/34012https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9876http://www.securityfocus.com/archive/1/467202/100/0/threadedhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435401https://usn.ubuntu.com/463-1/https://nvd.nist.gov