Vulnerability Name: | CVE-2001-0408 (CCN-6259) | ||||||||
Assigned: | 2001-03-21 | ||||||||
Published: | 2001-03-21 | ||||||||
Updated: | 2017-10-10 | ||||||||
Summary: | vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes. | ||||||||
CVSS v3 Severity: | 4.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: CCN Type: Caldera International, Inc. Security Advisory CSSA-2001-014.0 vim - embedded modline exploits Source: CCN Type: Immunix OS Security Advisory IMNX-2001-70-011-01 vim Source: MITRE Type: CNA CVE-2001-0408 Source: BUGTRAQ Type: UNKNOWN 20010329 Immunix OS Security update for vim Source: CCN Type: RHSA-2001-008 Updated vim packages available Source: CALDERA Type: Patch, Vendor Advisory CSSA-2001-014.0 Source: MANDRAKE Type: UNKNOWN MDKSA-2001:035 Source: SUSE Type: UNKNOWN SuSE-SA:2001:12 Source: CCN Type: OSVDB ID: 1779 Vim statusline Text-Embedded Command Execution Source: REDHAT Type: Patch, Vendor Advisory RHSA-2001:008 Source: BID Type: Patch, Vendor Advisory 2510 Source: CCN Type: BID-2510 VIM statusline Text-Embedded Command Execution Vulnerability Source: CCN Type: SuSE Security Announcement SuSE-SA:2001:012 vim/gvim Source: CCN Type: MandrakeSoft Security Advisory MDKSA-2001:035 vim Source: XF Type: UNKNOWN vim-elevate-privileges(6259) Source: XF Type: UNKNOWN vim-elevate-privileges(6259) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |