Summary: | vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tobias Weisserth <tobias> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED DUPLICATE | ||
Severity: | critical | CC: | vim |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1377 | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Tobias Weisserth
2004-03-31 16:21:19 UTC
aron & the vim team, can we have a fix plz? Unless I'm missing something, this was fixed ages ago. 6.2* should be unaffected. |