CVE-2007-2438

Source
https://nvd.nist.gov/vuln/detail/CVE-2007-2438
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2007-2438.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2007-2438
Related
Published
2007-05-02T21:19:00Z
Modified
2024-11-21T00:30:47Z
Summary
[none]
Details

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

References

Affected packages

Debian:11 / vim

Package

Name
vim
Purl
pkg:deb/debian/vim?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:7.1-022+1

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / vim

Package

Name
vim
Purl
pkg:deb/debian/vim?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:7.1-022+1

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / vim

Package

Name
vim
Purl
pkg:deb/debian/vim?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:7.1-022+1

Ecosystem specific

{
    "urgency": "low"
}