http://www.guninski.com/vim1.html
<QUOTE>
Description:
Opening a specially crafted text file with vim can execute arbitrary
shell
commands and pass parameters to them.
Some exploit scenarios include mail user agents which use vim as editor
(mutt) or examining log files with vim. The malicous text should be near
the begining or the end of the file which mitigates the risk.

Details:
The problem are so called modelines, which can execute some commands in
vim, though they are intended to be sandboxed.
</QUOTE>

The cure is to put "set modelines=0" in ~/.vimrc or /etc/vim/vimrc.

Is the cure worse than the disease?

-- 
+------------------------------------------------------------+
| Ron Johnson, Jr.     mailto:[EMAIL PROTECTED]          |
| Jefferson, LA  USA   http://members.cox.net/ron.l.johnson  |
|                                                            |
| "Basically, I got on the plane with a bomb. Basically, I   |
|  tried to ignite it. Basically, yeah, I intended to damage |
|  the plane."                                               |
|    RICHARD REID, who tried to blow up American Airlines    |
|                  Flight 63                                 |
+------------------------------------------------------------+


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to