Vulnerability Details : CVE-2002-1377
vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.
Products affected by CVE-2002-1377
- cpe:2.3:a:vim_development_group:vim:5.7:*:*:*:*:*:*:*
- cpe:2.3:a:vim_development_group:vim:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:vim_development_group:vim:5.1:*:*:*:*:*:*:*
- cpe:2.3:a:vim_development_group:vim:5.8:*:*:*:*:*:*:*
- cpe:2.3:a:vim_development_group:vim:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:vim_development_group:vim:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:vim_development_group:vim:5.2:*:*:*:*:*:*:*
- cpe:2.3:a:vim_development_group:vim:5.3:*:*:*:*:*:*:*
- cpe:2.3:a:vim_development_group:vim:5.4:*:*:*:*:*:*:*
- cpe:2.3:a:vim_development_group:vim:5.5:*:*:*:*:*:*:*
- cpe:2.3:a:vim_development_group:vim:5.6:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2002-1377
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 20 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2002-1377
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST |
References for CVE-2002-1377
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/10835
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000812
CONECTIVA | AnĂ¡lises dos Melhores Produtos Online (#10 Melhores)
-
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/55700
-
http://www.securityfocus.com/bid/6384
-
http://marc.info/?l=bugtraq&m=108077992208690&w=2
'OpenLinux: vim arbitrary commands execution through modelines' - MARC
-
http://www.guninski.com/vim1.html
Some vim problems, yet still vim much better than windowsPatch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2002-302.html
Support
-
http://www.redhat.com/support/errata/RHSA-2002-297.html
SupportPatch;Vendor Advisory
-
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:012
-
http://lists.grok.org.uk/pipermail/full-disclosure/2002-December/002948.html
[Full-Disclosure] Mailing List Charter
Jump to