Secunia Research has discovered a vulnerability in Vim, which can be exploited by malicious people to compromise a vulnerable system. A format string error in the "helptags_one()" function in src/ex_cmds.c when running the "helptags" command can be exploited to execute arbitrary code via specially crafted help files. Successful exploitation requires that the user is tricked into running "helptags" on malicious data. The vulnerability is confirmed in versions 6.4 and 7.1. Other versions may also be affected. Solution: Apply the vendor's official patch: ftp://ftp.vim.org/pub/vim/patches/7.1/7.1.039 Do not run "helptags" on untrusted data. Provided and/or discovered by: Ulf Harnhammar, Secunia Research.
setting status and cc'ing herd. vim, please advise
*** This bug has been marked as a duplicate of bug 185677 ***