Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:STC:VIM-MODELINES-RCE

Severity

Major

Recommended

Yes

Recommended Action

Drop

Category

HTTP

Keywords

Vim Modelines Remote Command Execution

Release Date

2017/01/09

Update Number

2820

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Vim Modelines Remote Command Execution


A command execution vulnerability has been reported in Vim. The vulnerability is due to a lack of input validation when processing modeline values for filetype, keymap, and syntax. A remote attacker can exploit this vulnerability by enticing a user to open a crafted file in Vim. Successful exploitation could result in the execution of arbitrary commands under the context of the target user.

Extended Description

vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.

Affected Products

  • Debian debian_linux 8.0
  • Vim vim 8.0.0055

References

  • CVE: CVE-2016-1248

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out