The MITRE CVE dictionary describes this issue as:
vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes.
Red Hat security errata
|Red Hat Linux 5.2||RHSA-2001:008||July 10, 2001|
|Red Hat Linux 6.2||RHSA-2001:008||July 10, 2001|
|Red Hat Linux 7.0||RHSA-2001:008||July 10, 2001|
This page is generated automatically and has not been checked for errors or omissions.
For clarification or corrections please contact the Red Hat Security Response Team.