vulnerability
FreeBSD: VID-398d1ec1-f7e6-11ef-bb15-002590af0794: vim -- Potential code execution
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:S/C:C/I:C/A:C) | Mar 2, 2025 | Mar 4, 2025 | Dec 10, 2025 |
Severity
9
CVSS
(AV:N/AC:M/Au:S/C:C/I:C/A:C)
Published
Mar 2, 2025
Added
Mar 4, 2025
Modified
Dec 10, 2025
Description
vim reports: Summary Potential code execution with tar.vim and special crafted tar files Description Vim is distributed with the tar.vim plugin, that allows easy editing and viewing of (compressed or uncompressed) tar files. Since commit 129a844 (Nov 11, 2024 runtime(tar): Update tar.vim to support permissions), the tar.vim plugin uses the ":read " ex command line to append below the cursor position, however the is not sanitized and is taken literaly from the tar archive. This allows to execute shell commands via special crafted tar archives. Whether this really happens, depends on the shell being used ('shell' option, which is set using $SHELL). Impact Impact is high but a user must be convinced to edit such a file using Vim which will reveal the filename, so a careful user may suspect some strange things going on.
Solutions
freebsd-upgrade-package-vimfreebsd-upgrade-package-vim-gtk2freebsd-upgrade-package-vim-gtk3freebsd-upgrade-package-vim-motiffreebsd-upgrade-package-vim-x11freebsd-upgrade-package-vim-tiny
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.