CVE-2019-12735

Published: 05 June 2019

getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.

From the Ubuntu security team

It was discovered that Vim incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code.

Priority

Medium

CVSS 3 base score: 8.6

Status

Package Release Status
neovim
Launchpad, Ubuntu, Debian
Upstream
Released (0.3.6)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(0.3.4-2)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(0.3.4-2)
Ubuntu 18.04 LTS (Bionic Beaver) Needed

Ubuntu 16.04 ESM (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

vim
Launchpad, Ubuntu, Debian
Upstream
Released (8.1.1365)
Ubuntu 21.04 (Hirsute Hippo)
Released (2:8.1.0875-4ubuntu1)
Ubuntu 20.04 LTS (Focal Fossa)
Released (2:8.1.0875-4ubuntu1)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (2:8.0.1453-1ubuntu1.1)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (2:7.4.1689-3ubuntu1.3)
Ubuntu 14.04 ESM (Trusty Tahr) Not vulnerable