7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.8 High
EPSS
Percentile
98.3%
vim before patch 8.0.0056 does not properly validate values for the ‘filetype’, ‘syntax’ and ‘keymap’ options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.
CPE | Name | Operator | Version |
---|---|---|---|
vim:vim | vim | le | 8.0.0055 |
debian:debian_linux | debian debian linux | eq | 8.0 |
openwall.com/lists/oss-security/2016/11/22/20
rhn.redhat.com/errata/RHSA-2016-2972.html
www.debian.org/security/2016/dsa-3722
www.securityfocus.com/bid/94478
www.securitytracker.com/id/1037338
www.ubuntu.com/usn/USN-3139-1
anonscm.debian.org/cgit/pkg-vim/vim.git/tree/debian/changelog
github.com/neovim/neovim/commit/4fad66fbe637818b6b3d6bc5d21923ba72795040
github.com/vim/vim/commit/d0b5138ba4bccff8a744c99836041ef6322ed39a
github.com/vim/vim/releases/tag/v8.0.0056
lists.debian.org/debian-lts-announce/2016/11/msg00025.html
lists.debian.org/debian-security-announce/2016/msg00305.html
security.gentoo.org/glsa/201701-29
More
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.8 High
EPSS
Percentile
98.3%