| Summary | The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines. |
|---|---|
| Summary | Successful exploitation requires that the "modelines" option is enabled and the user is tricked into opening a malicious file. |
| Summary | The vendor has addressed this issue with the following patches: VIM Development Group VIM 7.0- VIM Development Group patch 7.0.234 VIM Development Group patch 7.0.235 |
| Publication Date | May 3, 2007, 6:19 a.m. |
| Registration Date | Jan. 29, 2021, 2:12 p.m. |
| Last Update | Oct. 17, 2018, 1:43 a.m. |
| CVSS2.0 : HIGH | |
| Score | 7.6 |
|---|---|
| Vector | AV:N/AC:H/Au:N/C:C/I:C/A:C |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 高 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| Get all privileges. | はい |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | はい |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:vim_development_group:vim:7.0:*:*:*:*:*:*:* | |||||