Vulnerabilities > CVE-2019-12735 - OS Command Injection vulnerability in multiple products

047910
CVSS 8.6 - HIGH
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
local
low complexity
vim
neovim
CWE-78
nessus
exploit available

Summary

getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.

Vulnerable Configurations

Part Description Count
Application
Vim
7041
Application
Neovim
17

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Command Line Execution through SQL Injection
    An attacker uses standard SQL injection methods to inject data into the command line for execution. This could be done directly through misuse of directives such as MSSQL_xp_cmdshell or indirectly through injection of data into the database that would be interpreted as shell commands. Sometime later, an unscrupulous backend application (or could be part of the functionality of the same application) fetches the injected data stored in the database and uses this data as command line arguments without performing proper validation. The malicious data escapes that data plane by spawning new commands to be executed on the host.
  • Command Delimiters
    An attack of this type exploits a programs' vulnerabilities that allows an attacker's commands to be concatenated onto a legitimate command with the intent of targeting other resources such as the file system or database. The system that uses a filter or a blacklist input validation, as opposed to whitelist validation is vulnerable to an attacker who predicts delimiters (or combinations of delimiters) not present in the filter or blacklist. As with other injection attacks, the attacker uses the command delimiter payload as an entry point to tunnel through the application and activate additional attacks through SQL queries, shell commands, network scanning, and so on.
  • Exploiting Multiple Input Interpretation Layers
    An attacker supplies the target software with input data that contains sequences of special characters designed to bypass input validation logic. This exploit relies on the target making multiples passes over the input data and processing a "layer" of special characters with each pass. In this manner, the attacker can disguise input that would otherwise be rejected as invalid by concealing it with layers of special/escape characters that are stripped off by subsequent processing steps. The goal is to first discover cases where the input validation layer executes before one or more parsing layers. That is, user input may go through the following logic in an application: In such cases, the attacker will need to provide input that will pass through the input validator, but after passing through parser2, will be converted into something that the input validator was supposed to stop.
  • Argument Injection
    An attacker changes the behavior or state of a targeted application through injecting data or command syntax through the targets use of non-validated and non-filtered arguments of exposed services or methods.
  • OS Command Injection
    In this type of an attack, an adversary injects operating system commands into existing application functions. An application that uses untrusted input to build command strings is vulnerable. An adversary can leverage OS command injection in an application to elevate privileges, execute arbitrary commands and compromise the underlying operating system.

Exploit-Db

idEDB-ID:46973
last seen2019-06-07
modified2019-06-04
published2019-06-04
reporterExploit-DB
sourcehttps://www.exploit-db.com/download/46973
titleVim < 8.1.1365 / Neovim < 0.3.6 - Arbitrary Code Execution

Nessus

  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2019-1_0-0237_CURL.NASL
    descriptionAn update of the curl package has been released.
    last seen2020-06-01
    modified2020-06-02
    plugin id126195
    published2019-06-25
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126195
    titlePhoton OS 1.0: Curl PHSA-2019-1.0-0237
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2019-2_0-0162_VIM.NASL
    descriptionAn update of the vim package has been released.
    last seen2020-06-01
    modified2020-06-02
    plugin id126211
    published2019-06-25
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126211
    titlePhoton OS 2.0: Vim PHSA-2019-2.0-0162
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2019-1_0-0237_ZOOKEEPER.NASL
    descriptionAn update of the zookeeper package has been released.
    last seen2020-06-01
    modified2020-06-02
    plugin id126205
    published2019-06-25
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126205
    titlePhoton OS 1.0: Zookeeper PHSA-2019-1.0-0237
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-1759.NASL
    descriptionThis update for neovim fixes the following issues : neovim was updated to version 0.3.7 : - CVE-2019-12735: source should check sandbox (boo#1137443) - genappimage.sh: migrate to linuxdeploy Version Update to version 0.3.5 : - options: properly reset directories on
    last seen2020-06-01
    modified2020-06-02
    plugin id126899
    published2019-07-22
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126899
    titleopenSUSE Security Update : neovim (openSUSE-2019-1759)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20190701_VIM_ON_SL7_X.NASL
    descriptionSecurity Fix(es) : - vim/neovim:
    last seen2020-03-18
    modified2019-07-02
    plugin id126436
    published2019-07-02
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126436
    titleScientific Linux Security Update : vim on SL7.x x86_64 (20190701)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-1456-1.NASL
    descriptionThis update for vim fixes the following issue : Security issue fixed : CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id125847
    published2019-06-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125847
    titleSUSE SLED12 / SLES12 Security Update : vim (SUSE-SU-2019:1456-1)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-1871.NASL
    descriptionSeveral minor issues have been fixed in vim, a highly configurable text editor. CVE-2017-11109 Vim allows attackers to cause a denial of service (invalid free) or possibly have unspecified other impact via a crafted source (aka -S) file. CVE-2017-17087 Vim sets the group ownership of a .swp file to the editor
    last seen2020-06-01
    modified2020-06-02
    plugin id127480
    published2019-08-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127480
    titleDebian DLA-1871-1 : vim security update
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-4016-1.NASL
    descriptionIt was discovered that Vim incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-5953) It was discovered that Vim incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code. (CVE-2019-12735). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id125853
    published2019-06-12
    reporterUbuntu Security Notice (C) 2019-2020 Canonical, Inc. / NASL script (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125853
    titleUbuntu 16.04 LTS / 18.04 LTS / 18.10 / 19.04 : vim vulnerabilities (USN-4016-1)
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2019-1_0-0237_GLIB.NASL
    descriptionAn update of the glib package has been released.
    last seen2020-06-01
    modified2020-06-02
    plugin id126196
    published2019-06-25
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126196
    titlePhoton OS 1.0: Glib PHSA-2019-1.0-0237
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2019-1_0-0237_GNUPG.NASL
    descriptionAn update of the gnupg package has been released.
    last seen2020-06-01
    modified2020-06-02
    plugin id126197
    published2019-06-25
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126197
    titlePhoton OS 1.0: Gnupg PHSA-2019-1.0-0237
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2019-1_0-0237_WGET.NASL
    descriptionAn update of the wget package has been released.
    last seen2020-06-01
    modified2020-06-02
    plugin id126204
    published2019-06-25
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126204
    titlePhoton OS 1.0: Wget PHSA-2019-1.0-0237
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2019-1_0-0237_OPENSSH.NASL
    descriptionAn update of the openssh package has been released.
    last seen2020-06-01
    modified2020-06-02
    plugin id126199
    published2019-06-25
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126199
    titlePhoton OS 1.0: Openssh PHSA-2019-1.0-0237
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1997.NASL
    descriptionAccording to the version of the vim packages installed, the EulerOS installation on the remote host is affected by the following vulnerability : - It was found that the `:source!` command was not restricted by the sandbox mode. If modeline was explicitly enabled, opening a specially crafted text file in vim could result in arbitrary command execution.(CVE-2019-12735) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-08
    modified2019-09-24
    plugin id129190
    published2019-09-24
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/129190
    titleEulerOS 2.0 SP3 : vim (EulerOS-SA-2019-1997)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-1562.NASL
    descriptionThis update for vim fixes the following issue : Security issue fixed : - CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443). This update was imported from the SUSE:SLE-12:Update update project.
    last seen2020-06-01
    modified2020-06-02
    plugin id125983
    published2019-06-18
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125983
    titleopenSUSE Security Update : vim (openSUSE-2019-1562)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-1561.NASL
    descriptionThis update for vim fixes the following issue : Security issue fixed : - CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443). This update was imported from the SUSE:SLE-15:Update update project.
    last seen2020-06-01
    modified2020-06-02
    plugin id125982
    published2019-06-18
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125982
    titleopenSUSE Security Update : vim (openSUSE-2019-1561)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_BBDB97138E0911E987BC002590ACAE31.NASL
    descriptionSecurity releases for Vim/NeoVim : Sandbox escape allows for arbitrary code execution.
    last seen2020-06-01
    modified2020-06-02
    plugin id125913
    published2019-06-14
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125913
    titleFreeBSD : Vim/NeoVim -- Security vulnerability (bbdb9713-8e09-11e9-87bc-002590acae31)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1766.NASL
    descriptionAccording to the version of the vim packages installed, the EulerOS installation on the remote host is affected by the following vulnerability : - It was found that the `:source!` command was not restricted by the sandbox mode. If modeline was explicitly enabled, opening a specially crafted text file in vim could result in arbitrary command execution.(CVE-2019-12735) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-03
    modified2019-07-25
    plugin id127003
    published2019-07-25
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127003
    titleEulerOS 2.0 SP8 : vim (EulerOS-SA-2019-1766)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2019-1619.NASL
    descriptionAn update for vim is now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es) : * vim/neovim:
    last seen2020-06-01
    modified2020-06-02
    plugin id126387
    published2019-07-02
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126387
    titleCentOS 7 : vim (CESA-2019:1619)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-4487.NASL
    descriptionUser
    last seen2020-06-01
    modified2020-06-02
    plugin id126968
    published2019-07-24
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126968
    titleDebian DSA-4487-1 : neovim - security update
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1690.NASL
    descriptionAccording to the version of the vim packages installed, the EulerOS installation on the remote host is affected by the following vulnerability : - It was found that the `:source!` command was not restricted by the sandbox mode. If modeline was explicitly enabled, opening a specially crafted text file in vim could result in arbitrary command execution.(CVE-2019-12735) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-06
    modified2019-07-02
    plugin id126431
    published2019-07-02
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126431
    titleEulerOS 2.0 SP5 : vim (EulerOS-SA-2019-1690)
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2019-1_0-0237_SQLITE.NASL
    descriptionAn update of the sqlite package has been released.
    last seen2020-06-01
    modified2020-06-02
    plugin id126202
    published2019-06-25
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126202
    titlePhoton OS 1.0: Sqlite PHSA-2019-1.0-0237
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1699.NASL
    descriptionAccording to the version of the vim packages installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerability : - It was found that the `:source!` command was not restricted by the sandbox mode. If modeline was explicitly enabled, opening a specially crafted text file in vim could result in arbitrary command execution.(CVE-2019-12735) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id126541
    published2019-07-09
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126541
    titleEulerOS Virtualization for ARM 64 3.0.2.0 : vim (EulerOS-SA-2019-1699)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-1457-1.NASL
    descriptionThis update for vim fixes the following issue : Security issue fixed : CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id125848
    published2019-06-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125848
    titleSUSE SLED15 / SLES15 Security Update : vim (SUSE-SU-2019:1457-1)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-1793.NASL
    descriptionAn update for vim is now available for Red Hat Enterprise Linux 7.5 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es) : * vim/neovim:
    last seen2020-06-01
    modified2020-06-02
    plugin id126761
    published2019-07-17
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126761
    titleRHEL 7 : vim (RHSA-2019:1793)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-DCD49378B8.NASL
    description1717503 - Security issue: patch 8.1.1365: source command doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id125868
    published2019-06-13
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125868
    titleFedora 29 : 2:vim (2019-dcd49378b8)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-1619.NASL
    descriptionAn update for vim is now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es) : * vim/neovim:
    last seen2020-06-01
    modified2020-06-02
    plugin id126302
    published2019-06-27
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126302
    titleRHEL 7 / 8 : vim (RHSA-2019:1619)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-4016-2.NASL
    descriptionIt was discovered that Neovim incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code. (CVE-2019-12735). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id125854
    published2019-06-12
    reporterUbuntu Security Notice (C) 2019 Canonical, Inc. / NASL script (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125854
    titleUbuntu 18.10 / 19.04 : Neovim vulnerability (USN-4016-2)
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2019-1_0-0237_VIM.NASL
    descriptionAn update of the vim package has been released.
    last seen2020-06-01
    modified2020-06-02
    plugin id126203
    published2019-06-25
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126203
    titlePhoton OS 1.0: Vim PHSA-2019-1.0-0237
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2019-1774.NASL
    descriptionFrom Red Hat Security Advisory 2019:1774 : An update for vim is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es) : * vim/neovim:
    last seen2020-06-01
    modified2020-06-02
    plugin id126807
    published2019-07-19
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126807
    titleOracle Linux 6 : vim (ELSA-2019-1774)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2019-1619.NASL
    descriptionFrom Red Hat Security Advisory 2019:1619 : An update for vim is now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es) : * vim/neovim:
    last seen2020-06-01
    modified2020-06-02
    plugin id126316
    published2019-06-28
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126316
    titleOracle Linux 7 / 8 : vim (ELSA-2019-1619)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20190715_VIM_ON_SL6_X.NASL
    descriptionSecurity Fix(es) : - vim/neovim:
    last seen2020-03-18
    modified2019-07-16
    plugin id126715
    published2019-07-16
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126715
    titleScientific Linux Security Update : vim on SL6.x i386/x86_64 (20190715)
  • NASL familyAmazon Linux Local Security Checks
    NASL idAL2_ALAS-2019-1239.NASL
    descriptionIt was found that the `:source!` command was not restricted by the sandbox mode. If modeline was explicitly enabled, opening a specially crafted text file in vim could result in arbitrary command execution. (CVE-2019-12735)
    last seen2020-06-01
    modified2020-06-02
    plugin id127460
    published2019-08-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127460
    titleAmazon Linux 2 : vim (ALAS-2019-1239)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1753.NASL
    descriptionAccording to the version of the vim packages installed, the EulerOS installation on the remote host is affected by the following vulnerability : - It was found that the `:source!` command was not restricted by the sandbox mode. If modeline was explicitly enabled, opening a specially crafted text file in vim could result in arbitrary command execution.(CVE-2019-12735) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-06
    modified2019-07-22
    plugin id126880
    published2019-07-22
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126880
    titleEulerOS 2.0 SP2 : vim (EulerOS-SA-2019-1753)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-1774.NASL
    descriptionAn update for vim is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es) : * vim/neovim:
    last seen2020-06-01
    modified2020-06-02
    plugin id126710
    published2019-07-16
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126710
    titleRHEL 6 : vim (RHSA-2019:1774)
  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2020-0020_VIM.NASL
    descriptionThe remote NewStart CGSL host, running version MAIN 4.05, has vim packages installed that are affected by a vulnerability: - getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim. (CVE-2019-12735) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-03-18
    modified2020-03-08
    plugin id134315
    published2020-03-08
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/134315
    titleNewStart CGSL MAIN 4.05 : vim Vulnerability (NS-SA-2020-0020)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-D79F89346C.NASL
    description1717503 - Security issue: patch 8.1.1365: source command doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id125788
    published2019-06-10
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125788
    titleFedora 30 : 2:vim (2019-d79f89346c)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-14078-1.NASL
    descriptionThis update for vim fixes the following issues : Security issue fixed : CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id125846
    published2019-06-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125846
    titleSUSE SLES11 Security Update : vim (SUSE-SU-2019:14078-1)
  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2019-0161_VIM.NASL
    descriptionThe remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has vim packages installed that are affected by a vulnerability: - It was found that the `:source!` command was not restricted by the sandbox mode. If modeline was explicitly enabled, opening a specially crafted text file in vim could result in arbitrary command execution. (CVE-2019-12735) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id127443
    published2019-08-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127443
    titleNewStart CGSL CORE 5.04 / MAIN 5.04 : vim Vulnerability (NS-SA-2019-0161)
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2019-1_0-0237_BINUTILS.NASL
    descriptionAn update of the binutils package has been released.
    last seen2020-06-01
    modified2020-06-02
    plugin id126194
    published2019-06-25
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126194
    titlePhoton OS 1.0: Binutils PHSA-2019-1.0-0237
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2019-1_0-0237_LIBVIRT.NASL
    descriptionAn update of the libvirt package has been released.
    last seen2020-06-01
    modified2020-06-02
    plugin id126198
    published2019-06-25
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126198
    titlePhoton OS 1.0: Libvirt PHSA-2019-1.0-0237
  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2019-0164_VIM.NASL
    descriptionThe remote NewStart CGSL host, running version CORE 5.05 / MAIN 5.05, has vim packages installed that are affected by a vulnerability: - It was found that the `:source!` command was not restricted by the sandbox mode. If modeline was explicitly enabled, opening a specially crafted text file in vim could result in arbitrary command execution. (CVE-2019-12735) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id127449
    published2019-08-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127449
    titleNewStart CGSL CORE 5.05 / MAIN 5.05 : vim Vulnerability (NS-SA-2019-0164)
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2019-2_0-0162_SQLITE.NASL
    descriptionAn update of the sqlite package has been released.
    last seen2020-06-01
    modified2020-06-02
    plugin id126210
    published2019-06-25
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126210
    titlePhoton OS 2.0: Sqlite PHSA-2019-2.0-0162
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-202003-04.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-202003-04 (Vim, gVim: Remote execution of arbitrary code) It was found that the :source! command was not restricted by the sandbox mode. If modeline was explicitly enabled, opening a specially crafted text file in vim could result in arbitrary command execution. Impact : A remote attacker could entice a user to open a specially crafted file using Vim or gVim, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen2020-03-19
    modified2020-03-13
    plugin id134471
    published2020-03-13
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/134471
    titleGLSA-202003-04 : Vim, gVim: Remote execution of arbitrary code
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2019-1239.NASL
    descriptionIt was found that the `:source!` command was not restricted by the sandbox mode. If modeline was explicitly enabled, opening a specially crafted text file in vim could result in arbitrary command execution. (CVE-2019-12735)
    last seen2020-06-01
    modified2020-06-02
    plugin id127067
    published2019-07-26
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127067
    titleAmazon Linux AMI : vim (ALAS-2019-1239)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2019-1774.NASL
    descriptionAn update for vim is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es) : * vim/neovim:
    last seen2020-06-01
    modified2020-06-02
    plugin id126790
    published2019-07-19
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126790
    titleCentOS 6 : vim (CESA-2019:1774)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-4467.NASL
    descriptionUser
    last seen2020-06-01
    modified2020-06-02
    plugin id126013
    published2019-06-19
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126013
    titleDebian DSA-4467-1 : vim - security update
  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2019-0177_VIM.NASL
    descriptionThe remote NewStart CGSL host, running version MAIN 4.06, has vim packages installed that are affected by a vulnerability: - getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim. (CVE-2019-12735) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id128690
    published2019-09-11
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128690
    titleNewStart CGSL MAIN 4.06 : vim Vulnerability (NS-SA-2019-0177)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-1947.NASL
    descriptionAn update for vim is now available for Red Hat Enterprise Linux 7.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es) : * vim/neovim:
    last seen2020-06-01
    modified2020-06-02
    plugin id127634
    published2019-08-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127634
    titleRHEL 7 : vim (RHSA-2019:1947)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-1551.NASL
    descriptionThis update for neovim fixes the following issues : Security issue fixed : - CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443).	
    last seen2020-05-31
    modified2019-06-14
    plugin id125918
    published2019-06-14
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125918
    titleopenSUSE Security Update : neovim (openSUSE-2019-1551)
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2019-2_0-0162_DOCKER.NASL
    descriptionAn update of the docker package has been released.
    last seen2020-06-01
    modified2020-06-02
    plugin id126209
    published2019-06-25
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126209
    titlePhoton OS 2.0: Docker PHSA-2019-2.0-0162
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2019-1_0-0237_PYTHON2.NASL
    descriptionAn update of the python2 package has been released.
    last seen2020-06-01
    modified2020-06-02
    plugin id126200
    published2019-06-25
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126200
    titlePhoton OS 1.0: Python2 PHSA-2019-1.0-0237
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2019-1_0-0237_PYTHON3.NASL
    descriptionAn update of the python3 package has been released.
    last seen2020-06-01
    modified2020-06-02
    plugin id126201
    published2019-06-25
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126201
    titlePhoton OS 1.0: Python3 PHSA-2019-1.0-0237

Redhat

advisories
  • bugzilla
    id1718308
    titleCVE-2019-12735 vim/neovim: ':source!' command allows arbitrary command execution via modelines
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 7 is installed
        ovaloval:com.redhat.rhba:tst:20150364027
      • OR
        • AND
          • commentvim-X11 is earlier than 2:7.4.160-6.el7_6
            ovaloval:com.redhat.rhsa:tst:20191619001
          • commentvim-X11 is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20162972008
        • AND
          • commentvim-filesystem is earlier than 2:7.4.160-6.el7_6
            ovaloval:com.redhat.rhsa:tst:20191619003
          • commentvim-filesystem is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20162972010
        • AND
          • commentvim-minimal is earlier than 2:7.4.160-6.el7_6
            ovaloval:com.redhat.rhsa:tst:20191619005
          • commentvim-minimal is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20162972002
        • AND
          • commentvim-enhanced is earlier than 2:7.4.160-6.el7_6
            ovaloval:com.redhat.rhsa:tst:20191619007
          • commentvim-enhanced is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20162972006
        • AND
          • commentvim-common is earlier than 2:7.4.160-6.el7_6
            ovaloval:com.redhat.rhsa:tst:20191619009
          • commentvim-common is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20162972004
    • AND
      • commentRed Hat Enterprise Linux 8 is installed
        ovaloval:com.redhat.rhba:tst:20193384074
      • OR
        • AND
          • commentvim-debugsource is earlier than 2:8.0.1763-11.el8_0
            ovaloval:com.redhat.rhsa:tst:20191619012
          • commentvim-debugsource is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20191619013
        • AND
          • commentvim-minimal is earlier than 2:8.0.1763-11.el8_0
            ovaloval:com.redhat.rhsa:tst:20191619014
          • commentvim-minimal is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20162972002
        • AND
          • commentvim-filesystem is earlier than 2:8.0.1763-11.el8_0
            ovaloval:com.redhat.rhsa:tst:20191619015
          • commentvim-filesystem is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20162972010
        • AND
          • commentvim-X11 is earlier than 2:8.0.1763-11.el8_0
            ovaloval:com.redhat.rhsa:tst:20191619016
          • commentvim-X11 is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20162972008
        • AND
          • commentvim-common is earlier than 2:8.0.1763-11.el8_0
            ovaloval:com.redhat.rhsa:tst:20191619017
          • commentvim-common is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20162972004
        • AND
          • commentvim-enhanced is earlier than 2:8.0.1763-11.el8_0
            ovaloval:com.redhat.rhsa:tst:20191619018
          • commentvim-enhanced is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20162972006
    rhsa
    idRHSA-2019:1619
    released2019-06-27
    severityImportant
    titleRHSA-2019:1619: vim security update (Important)
  • bugzilla
    id1718308
    titleCVE-2019-12735 vim/neovim: ':source!' command allows arbitrary command execution via modelines
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 6 is installed
        ovaloval:com.redhat.rhba:tst:20111656003
      • OR
        • AND
          • commentvim-minimal is earlier than 2:7.4.629-5.el6_10.2
            ovaloval:com.redhat.rhsa:tst:20191774001
          • commentvim-minimal is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20162972002
        • AND
          • commentvim-X11 is earlier than 2:7.4.629-5.el6_10.2
            ovaloval:com.redhat.rhsa:tst:20191774003
          • commentvim-X11 is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20162972008
        • AND
          • commentvim-filesystem is earlier than 2:7.4.629-5.el6_10.2
            ovaloval:com.redhat.rhsa:tst:20191774005
          • commentvim-filesystem is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20162972010
        • AND
          • commentvim-common is earlier than 2:7.4.629-5.el6_10.2
            ovaloval:com.redhat.rhsa:tst:20191774007
          • commentvim-common is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20162972004
        • AND
          • commentvim-enhanced is earlier than 2:7.4.629-5.el6_10.2
            ovaloval:com.redhat.rhsa:tst:20191774009
          • commentvim-enhanced is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20162972006
    rhsa
    idRHSA-2019:1774
    released2019-07-15
    severityImportant
    titleRHSA-2019:1774: vim security update (Important)
  • rhsa
    idRHSA-2019:1793
  • rhsa
    idRHSA-2019:1947
rpms
  • vim-X11-2:7.4.160-6.el7_6
  • vim-X11-2:8.0.1763-11.el8_0
  • vim-X11-debuginfo-2:8.0.1763-11.el8_0
  • vim-common-2:7.4.160-6.el7_6
  • vim-common-2:8.0.1763-11.el8_0
  • vim-common-debuginfo-2:8.0.1763-11.el8_0
  • vim-debuginfo-2:7.4.160-6.el7_6
  • vim-debuginfo-2:8.0.1763-11.el8_0
  • vim-debugsource-2:8.0.1763-11.el8_0
  • vim-enhanced-2:7.4.160-6.el7_6
  • vim-enhanced-2:8.0.1763-11.el8_0
  • vim-enhanced-debuginfo-2:8.0.1763-11.el8_0
  • vim-filesystem-2:7.4.160-6.el7_6
  • vim-filesystem-2:8.0.1763-11.el8_0
  • vim-minimal-2:7.4.160-6.el7_6
  • vim-minimal-2:8.0.1763-11.el8_0
  • vim-minimal-debuginfo-2:8.0.1763-11.el8_0
  • vim-X11-2:7.4.629-5.el6_10.2
  • vim-common-2:7.4.629-5.el6_10.2
  • vim-debuginfo-2:7.4.629-5.el6_10.2
  • vim-enhanced-2:7.4.629-5.el6_10.2
  • vim-filesystem-2:7.4.629-5.el6_10.2
  • vim-minimal-2:7.4.629-5.el6_10.2
  • vim-X11-2:7.4.160-4.el7_5.1
  • vim-common-2:7.4.160-4.el7_5.1
  • vim-debuginfo-2:7.4.160-4.el7_5.1
  • vim-enhanced-2:7.4.160-4.el7_5.1
  • vim-filesystem-2:7.4.160-4.el7_5.1
  • vim-minimal-2:7.4.160-4.el7_5.1
  • vim-X11-2:7.4.160-2.el7_4.1
  • vim-common-2:7.4.160-2.el7_4.1
  • vim-debuginfo-2:7.4.160-2.el7_4.1
  • vim-enhanced-2:7.4.160-2.el7_4.1
  • vim-filesystem-2:7.4.160-2.el7_4.1
  • vim-minimal-2:7.4.160-2.el7_4.1

The Hacker News

idTHN:9460624BCD0856A65B8FA82B14272221
last seen2019-06-10
modified2019-06-10
published2019-06-10
reporterThe Hacker News
sourcehttps://thehackernews.com/2019/06/linux-vim-vulnerability.html
titleYour Linux Can Get Hacked Just by Opening a File in Vim or Neovim Editor

References