CVE-2002-1377
Summary
| CVE | CVE-2002-1377 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2002-12-23 05:00:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt. |
Risk And Classification
Primary CVSS: v2.0 4.6 from [email protected]
AV:L/AC:L/Au:N/C:P/I:P/A:P
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
LocalAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:L/AC:L/Au:N/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Vim Development Group | Vim | 5.0 | All | All | All |
| Application | Vim Development Group | Vim | 5.1 | All | All | All |
| Application | Vim Development Group | Vim | 5.2 | All | All | All |
| Application | Vim Development Group | Vim | 5.3 | All | All | All |
| Application | Vim Development Group | Vim | 5.4 | All | All | All |
| Application | Vim Development Group | Vim | 5.5 | All | All | All |
| Application | Vim Development Group | Vim | 5.6 | All | All | All |
| Application | Vim Development Group | Vim | 5.7 | All | All | All |
| Application | Vim Development Group | Vim | 5.8 | All | All | All |
| Application | Vim Development Group | Vim | 6.0 | All | All | All |
| Application | Vim Development Group | Vim | 6.1 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | Patch, Vendor Advisory |
| 'OpenLinux: vim arbitrary commands execution through modelines' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| VIM ModeLines Arbitrary Command Execution Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| # 55700, Free Sun Alert Notifications | af854a3a-2127-422b-91ae-364da2661108 | sunsolve.sun.com | |
| redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| [Full-Disclosure] Mailing List Charter | af854a3a-2127-422b-91ae-364da2661108 | lists.grok.org.uk | |
| Home - Conectiva | af854a3a-2127-422b-91ae-364da2661108 | distro.conectiva.com.br | |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| Mandrakesoft Security Advisories | af854a3a-2127-422b-91ae-364da2661108 | www.mandrakesoft.com | |
| Some vim problems, yet still vim much better than windows | af854a3a-2127-422b-91ae-364da2661108 | www.guninski.com | Patch, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.