[arch-security] [ASA-201611-29] neovim: arbitrary command execution
anthraxx at archlinux.org
Tue Nov 29 23:32:43 UTC 2016
Arch Linux Security Advisory ASA-201611-29
Date : 2016-11-29
CVE-ID : CVE-2016-1248
Package : neovim
Type : arbitrary command execution
Remote : No
Link : https://wiki.archlinux.org/index.php/CVE
The package neovim before version 0.1.7-1 is vulnerable to arbitrary
Upgrade to 0.1.7-1.
# pacman -Syu "neovim>=0.1.7-1"
The problem has been fixed upstream in version 0.1.7.
A vulnerability has been discovered in vim which would allow arbitrary
shell commands to be run if a user opened a file with a malicious
modeline. This is due to lack of validation of values for a few
options. Those options' values are then used in vim's scripts to build
a command string that's evaluated by execute, which is what allows the
shell commands to be run.
This has been fixed in Vim by patch 8.0.0056. Since Neovim shares this
code, it is also vulnerable.
An attacker is able to execute arbitrary commands by tricking a user to
open a malicious file with a special modeline.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 833 bytes
Desc: OpenPGP digital signature
More information about the arch-security