High severity7.8NVD Advisory· Published Nov 23, 2016· Updated May 6, 2026
CVE-2016-1248
CVE-2016-1248
Description
vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.
Affected products
2- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- openwall.com/lists/oss-security/2016/11/22/20nvdPatchThird Party Advisory
- anonscm.debian.org/cgit/pkg-vim/vim.git/tree/debian/changelognvdPatchThird Party Advisory
- github.com/neovim/neovim/commit/4fad66fbe637818b6b3d6bc5d21923ba72795040nvdPatchVendor Advisory
- github.com/vim/vim/commit/d0b5138ba4bccff8a744c99836041ef6322ed39anvdPatchVendor Advisory
- github.com/vim/vim/releases/tag/v8.0.0056nvdPatchVendor Advisory
- lists.debian.org/debian-lts-announce/2016/11/msg00025.htmlnvdMailing ListThird Party Advisory
- lists.debian.org/debian-security-announce/2016/msg00305.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2016-2972.htmlnvd
- www.debian.org/security/2016/dsa-3722nvd
- www.securityfocus.com/bid/94478nvd
- www.securitytracker.com/id/1037338nvd
- www.ubuntu.com/usn/USN-3139-1nvd
- security.gentoo.org/glsa/201701-29nvd
News mentions
0No linked articles in our index yet.