CVE-2016-1248
vim: Lack of validation of values for few options results in code exection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.
vim en versiones anteriores a patch 8.0.0056 no valida correctamente los valores para las opciones 'filetype', 'syntax' y 'keymap', lo que puede resulta en la ejecución de código arbitrario si se abre un archivo con una línea de modo especialmente manipulada.
A vulnerability was found in vim in how certain modeline options were treated. An attacker could craft a file that, when opened in vim with modelines enabled, could execute arbitrary commands with privileges of the user running vim.
Vim is an updated and improved version of the vi editor. Security Fix: A vulnerability was found in vim in how certain modeline options were treated. An attacker could craft a file that, when opened in vim with modelines enabled, could execute arbitrary commands with privileges of the user running vim.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-12-27 CVE Reserved
- 2016-11-23 CVE Published
- 2024-08-05 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-138: Improper Neutralization of Special Elements
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/94478 | Vdb Entry | |
http://www.securitytracker.com/id/1037338 | Vdb Entry | |
https://lists.debian.org/debian-lts-announce/2016/11/msg00025.html | Mailing List |
|
https://lists.debian.org/debian-security-announce/2016/msg00305.html | Third Party Advisory |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2016-2972.html | 2017-07-28 | |
http://www.debian.org/security/2016/dsa-3722 | 2017-07-28 | |
http://www.ubuntu.com/usn/USN-3139-1 | 2017-07-28 | |
https://security.gentoo.org/glsa/201701-29 | 2017-07-28 | |
https://access.redhat.com/security/cve/CVE-2016-1248 | 2016-12-21 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1398227 | 2016-12-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Vim Search vendor "Vim" | Vim Search vendor "Vim" for product "Vim" | <= 8.0.0055 Search vendor "Vim" for product "Vim" and version " <= 8.0.0055" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
|