CVE-2002-1377 Affecting vim package, versions <6.1.263-1
Snyk CVSS
Attack Complexity
Low
Threat Intelligence
Exploit Maturity
Mature
EPSS
0.06% (24th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-VIM-314823
- published 23 Dec 2002
- disclosed 23 Dec 2002
Introduced: 23 Dec 2002
CVE-2002-1377 Open this link in a new tabHow to fix?
Upgrade Debian:unstable
vim
to version 6.1.263-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim
package and not the vim
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.
References
- https://security-tracker.debian.org/tracker/CVE-2002-1377
- http://marc.info/?l=bugtraq&m=108077992208690&w=2
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000812
- http://lists.grok.org.uk/pipermail/full-disclosure/2002-December/002948.html
- http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/55700
- http://www.guninski.com/vim1.html
- http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:012
- http://www.securityfocus.com/bid/6384
- https://exchange.xforce.ibmcloud.com/vulnerabilities/10835
- http://www.redhat.com/support/errata/RHSA-2002-297.html
- http://www.redhat.com/support/errata/RHSA-2002-302.html
- https://www.exploit-db.com/exploits/46973