|Description||vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)|
Vulnerable and fixed packages
The table below lists information on source packages.
|vim (PTS)||stretch (security), stretch||2:8.0.0197-4+deb9u3||fixed|
|bookworm, sid, bullseye||2:8.2.2434-3||fixed|
The information below is based on the following data on fixed versions.
|Package||Type||Release||Fixed Version||Urgency||Origin||Debian Bugs|
woody seems to be still vulnerable
according to bug #178102 a fixed package was uploaded to the security team in January 2003
but no advisory (nor fixed package) have been published yet.
I've mailed maintainer Luca Filipozzi <email@example.com> about this.
No response from maintainer, I have mailed security team.
Martin Schulze don't consider this as an issue for updating woody.