Skip to primary content

Prime-WoW

My site, my way, no big company can change this

Prime-WoW

Main menu

  • Home
  • Discord
  • Forums
  • Games
    • 7DtD
      • 7DtD Map
      • 7DtD Official Forums
      • 7DtD Wiki
    • Minecraft
      • Survival Map
      • Vanilla Map
      • FTB Map
      • FTB Wiki
      • Download FTB Client
    • NWN
      • NWN Wiki
      • NWN Lexicon
      • NWN Vault
      • NWNX
      • NWN Info
      • Rhun Guide
    • Terraria
      • Terraria Map
    • WoW
      • Prime-WoW Site
      • WoW Armory
  • Unfiltered RSS
    • Bikes
    • Games
      • Kotaku
      • PS4 News
      • VR
    • Nature
      • TreeHugger
      • Survival
    • Technology
      • Hardware
        • Hot Hardware
      • Linux
        • Linux Today
        • LWN.net
        • LXer
        • Phoronix
        • RPi
      • LifeHacker
      • Akihabara News
      • AnandTech
      • Ars Technica
      • Engadget
      • Gear & Gadgets
      • Geekologie
      • Gizmodo
      • [H]ardOCP
      • io9
      • Slashdot
      • TG Daily

Post navigation

← Previous Next →

If you haven’t patched Vim or NeoVim text editors, you really, really should

Posted on June 12, 2019 by Xordac Prime
If you haven’t patched Vim or NeoVim text editors, you really, really should

Enlarge (credit: unknown)

A recently patched vulnerability in text editors preinstalled in a variety of Linux distributions allows hackers to take control of computers when users open a malicious text file. The latest version of Apple’s macOS is continuing to use a vulnerable version, although attacks only work when users have changed a default setting that enables a feature called modelines.

Vim and its forked derivative, NeoVim, contained a flaw that resided in modelines. This feature lets users specify window dimensions and other custom options near the start or end of a text file. While modelines restricts the commands available and runs them inside a sandbox that’s cordoned off from the operating system, researcher Armin Razmjou noticed the source! command (including the bang on the end) bypassed that protection.

“It reads and executes commands from a given file as if typed manually, running them after the sandbox has been left,” the researcher wrote in a post earlier this month.

Read 5 remaining paragraphs | Comments



Source: Ars Technica – If you haven’t patched Vim or NeoVim text editors, you really, really should

This entry was posted in Ars Technica, Unfiltered RSS and tagged Ars Technica by Xordac Prime. Bookmark the permalink.
Proudly powered by WordPress