Vulnerability Description
VIM before 6.3 and gVim before 6.3 allow local users to execute arbitrary commands via a file containing a crafted modeline that is executed when the file is viewed using options such as (1) termcap, (2) printdevice, (3) titleold, (4) filetype, (5) syntax, (6) backupext, (7) keymap, (8) patchmode, or (9) langmenu.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vim Development Group | Vim | 5.0 |
References
- http://marc.info/?l=bugtraq&m=110313588125609&w=2
- http://www.gentoo.org/security/en/glsa/glsa-200412-10.xmlPatchVendor Advisory
- http://www.redhat.com/support/errata/RHSA-2005-010.html
- http://www.redhat.com/support/errata/RHSA-2005-036.html
- https://bugzilla.fedora.us/show_bug.cgi?id=2343
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18503
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- http://marc.info/?l=bugtraq&m=110313588125609&w=2
- http://www.gentoo.org/security/en/glsa/glsa-200412-10.xmlPatchVendor Advisory
- http://www.redhat.com/support/errata/RHSA-2005-010.html
- http://www.redhat.com/support/errata/RHSA-2005-036.html
- https://bugzilla.fedora.us/show_bug.cgi?id=2343
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18503
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
FAQ
What is CVE-2004-1138?
CVE-2004-1138 is a vulnerability with a CVSS score of 7.2 (HIGH). VIM before 6.3 and gVim before 6.3 allow local users to execute arbitrary commands via a file containing a crafted modeline that is executed when the file is viewed using options such as (1) termcap, ...
How severe is CVE-2004-1138?
CVE-2004-1138 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-1138?
Check the references section above for vendor advisories and patch information. Affected products include: Vim Development Group Vim.