Rapid7 Vulnerability & Exploit Database

CESA-2005:010: vim security update

Back to Search

CESA-2005:010: vim security update

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
01/10/2005
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

Updated vim packages that fix a modeline vulnerability are now available.

VIM (Vi IMproved) is an updated and improved version of the vi screen-based editor. Ciaran McCreesh discovered a modeline vulnerability in VIM. It is possible that a malicious user could create a file containing a specially crafted modeline which could cause arbitrary command execution when viewed by a victim. Please note that this issue only affects users who have modelines and filetype plugins enabled, which is not the default. The Common Vulnerabilities and Exposures project has assigned the name CAN-2004-1138 to this issue. All users of VIM are advised to upgrade to these erratum packages, which contain a backported patch for this issue.

Solution(s)

  • centos-upgrade-vim-common
  • centos-upgrade-vim-enhanced
  • centos-upgrade-vim-minimal
  • centos-upgrade-vim-x11

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;