CVE-2019-12735

Name
CVE-2019-12735
Description
getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Patch https://github.com/vim/vim/commit/53575521406739cf20bbe4e384d88e7dca11f040
Exploit https://github.com/numirias/security/blob/master/doc/2019-06-04_ace-vim-neovim.md
Patch https://github.com/neovim/neovim/pull/10082
Mailing List https://bugs.debian.org/930024
Mailing List https://bugs.debian.org/930020
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2BMDSHTF754TITC6AQJPCS5IRIDMMIM7/
UBUNTU https://usn.ubuntu.com/4016-1/
UBUNTU https://usn.ubuntu.com/4016-2/
BID http://www.securityfocus.com/bid/108724
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRIRBC2YRGKPAWVRMZS4SZTGGCVRVZPR/
SUSE http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00031.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00036.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00037.html
DEBIAN https://www.debian.org/security/2019/dsa-4467
BUGTRAQ https://seclists.org/bugtraq/2019/Jun/33
CONFIRM https://support.f5.com/csp/article/K93144355
REDHAT https://access.redhat.com/errata/RHSA-2019:1619
REDHAT https://access.redhat.com/errata/RHSA-2019:1774
REDHAT https://access.redhat.com/errata/RHSA-2019:1793
SUSE http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00034.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00050.html
DEBIAN https://www.debian.org/security/2019/dsa-4487
BUGTRAQ https://seclists.org/bugtraq/2019/Jul/39
REDHAT https://access.redhat.com/errata/RHSA-2019:1947
MLIST https://lists.debian.org/debian-lts-announce/2019/08/msg00003.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00075.html
CONFIRM https://support.f5.com/csp/article/K93144355?utm_source=f5support&utm_medium=RSS
GENTOO https://security.gentoo.org/glsa/202003-04

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:* vim >= None < 8.1.1365

Vulnerable and fixed packages

Source package Branch Version Maintainer Status