Korean
<< Back
VID 14236
Severity 40
Port 22
Protocol TCP
Class LSC
Detailed Description The remote system does not apply CESA-2019:1619 which is vim security update. The system which does not apply the update is affected by the vulnerability that ':source!' command allows arbitrary command execution via modelines.

Note: This check solely relied on the vim RPM version of the remote system to assess this vulnerability, so this might be a false positive.

* References:
https://lists.centos.org/pipermail/centos-announce/2019-July/023345.html

* Platforms Affected:
CentOS Linux Server (v. 7)
Recommendation Update the affected packages.
Launch the graphical update tool through
System -> Administration -> Software Update

For a command line interface, use the following command to update the operating system:
# yum update
Related URL CVE-2019-12735 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)