Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2005-010: vim

Vulnerability Assessment Details

RHSA-2005-010: vim

Vulnerability Assessment Summary
Check for the version of the vim packages

Detailed Explanation for this Vulnerability Assessment

Updated vim packages that fix a modeline vulnerability are now available.

VIM (Vi IMproved) is an updated and improved version of the vi screen-based

Ciaran McCreesh discovered a modeline vulnerability in VIM. It is possible
that a malicious user could create a file containing a specially crafted
modeline which could cause arbitrary command execution when viewed by a
victim. Please note that this issue only affects users who have modelines
and filetype tests enabled, which is not the default. The Common
Vulnerabilities and Exposures project has assigned the name CVE-2004-1138
to this issue.

All users of VIM are advised to upgrade to these erratum packages,
which contain a backported patch for this issue.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

HP Pavilion 17T 17.3" 1080 Touchscreen i5-6300HQ 8GB 1TB+128GB SSD 4GB GTX960M
HP Pavilion 17T 17.3HP - Pavilion 23.8" All-In-One - Intel Pentium - 8GB Memory - 1TB Hard Drive ...
HP - Pavilion 23.8Western Digital GreenPower 1TB 3.5" SATA Hard Drive, WD10EURX
Western Digital GreenPower 1TB 3.5Dell Windows 10 Optiplex Tower Computer PC Core 2 Duo 4GB 1TB DVD 19" LCD
Dell Windows 10 Optiplex Tower Computer PC Core 2 Duo 4GB 1TB DVD 19


No Discussions have been posted on this vulnerability.