CVE-2019-12735

Published: 05 June 2019

getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.

From the Ubuntu security team

It was discovered that Vim incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code.

Priority

Medium

CVSS 3 base score: 8.6

Status

Package Release Status
neovim
Launchpad, Ubuntu, Debian
Upstream
Released (0.3.6)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(0.3.4-2)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(0.3.4-2)
Ubuntu 18.04 LTS (Bionic Beaver) Needed

Ubuntu 16.04 LTS (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Ubuntu 12.04 ESM (Precise Pangolin) Does not exist

vim
Launchpad, Ubuntu, Debian
Upstream
Released (8.1.1365)
Ubuntu 20.10 (Groovy Gorilla)
Released (2:8.1.0875-4ubuntu1)
Ubuntu 20.04 LTS (Focal Fossa)
Released (2:8.1.0875-4ubuntu1)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (2:8.0.1453-1ubuntu1.1)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (2:7.4.1689-3ubuntu1.3)
Ubuntu 14.04 ESM (Trusty Tahr) Not vulnerable

Ubuntu 12.04 ESM (Precise Pangolin) Not vulnerable