vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Vim | Vim_development_group | 5.7 (including) | 5.7 (including) |
Red Hat Linux 5.2 | RedHat | * | |
Red Hat Linux 6.2 | RedHat | * | |
Red Hat Linux 7.0 | RedHat | * |