Alpaquita LinuxStreamSecurity Advisory
Search Cve

CVE-2019-12735

Published: August 31, 2023Last modified: August 31, 2023

Description

getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.

Severity score breakdown

ParameterValue
Base score8.6
Attack VectorLOCAL
Attack complexityLOW
Privileges requiredNONE
User interactionREQUIRED
ScopeCHANGED
ConfidentialityHIGH
Integrity impactHIGH
Availability impactHIGH
VectorCVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSvimNot affected (9.0.0999-r0)
StreamvimNot affected (9.0.1676-r0)

References

ON THIS PAGE