Description of problem:
from the vim developer list:
> today somebody came to #vim, and pasted some modeline (containig joke or
> > such). He muttered something about not knowing what that means and left
> > before long. But (!) what I noticed is that feedkeys() was used as part of
> > foldexpression and it turned out that feedkeys() is allowed in sandbox,
> > which means malicious file can run arbitrary command via modeline like
> > this:
> > vim: fdm=expr fde=feedkeys("\\:!touch\ phantom_was_here\\<cr>")
> > I guess you can see the consequences. Is this known/intentional?
> That's pretty nasty. I'll make a patch right away.
This comment is from Bram Moolenaar, the upstream VIM maintainer
This issue is already public. Exploitable only if someone manages to get any
user to open a malicious file with vim. Even worse if that user is root ;-(
This should be fixed as fast as possible.
Version-Release number of selected component (if applicable):
any vim versions >= 7.0 vim-6.3(RHEl-3/RHEL-4) doesn't have the feedkeys function
patch already available at
*** Bug 230810 has been marked as a duplicate of this bug. ***
More issues have been found:
Fix available at http://tech.groups.yahoo.com/group/vimdev/message/46667
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.