Untrusted search path vulnerability in src/if_python.c in the Python interface in Vim before 7.2.045 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983), as demonstrated by an erroneous search path for plugin/bike.vim in bicyclerepair.
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484305
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493937
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
http://support.apple.com/kb/HT4077
http://www.mandriva.com/security/advisories?name=MDVSA-2009:047
http://www.openwall.com/lists/oss-security/2009/01/26/2
http://www.securityfocus.com/bid/33447
https://bugzilla.redhat.com/show_bug.cgi?id=481565
https://exchange.xforce.ibmcloud.com/vulnerabilities/48275
https://svn.pardus.org.tr/pardus/2008/applications/editors/vim/files/official/7.2.045
Source: MITRE
Published: 2009-01-28
Updated: 2017-08-08
Type: NVD-CWE-Other
Base Score: 6.9
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact Score: 10
Exploitability Score: 3.4
Severity: MEDIUM