|
|||
Rule General Information |
---|
Release Date: | 2017-09-06 | |
Rule Name: | FILE-OTHER Vim Modelines Remote Command Execution Vulnerability -3 (CVE-2016-1248) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened. | |
Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows | |
Reference: | SecurityFocusBID:94478 SecurityTrackerID:1037338 |
|
Solutions |
---|
More advisories have been published on the website, please visit for more suggestions: https://github.com/vim/vim/releases/tag/v8.0.0056 |