Lucene search

K
amazonAmazonALAS2-2019-1239
HistoryAug 07, 2019 - 11:39 p.m.

Important: vim

2019-08-0723:39:00
alas.aws.amazon.com
19

8.6 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

9 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

71.3%

Issue Overview:

It was found that the :source! command was not restricted by the sandbox mode. If modeline was explicitly enabled, opening a specially crafted text file in vim could result in arbitrary command execution. (CVE-2019-12735)

Affected Packages:

vim

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update ‘vim*’ to update your system.

New Packages:

aarch64:  
    vim-common-8.1.1602-1.amzn2.aarch64  
    vim-minimal-8.1.1602-1.amzn2.aarch64  
    vim-enhanced-8.1.1602-1.amzn2.aarch64  
    vim-X11-8.1.1602-1.amzn2.aarch64  
    vim-debuginfo-8.1.1602-1.amzn2.aarch64  
  
i686:  
    vim-common-8.1.1602-1.amzn2.i686  
    vim-minimal-8.1.1602-1.amzn2.i686  
    vim-enhanced-8.1.1602-1.amzn2.i686  
    vim-X11-8.1.1602-1.amzn2.i686  
    vim-debuginfo-8.1.1602-1.amzn2.i686  
  
noarch:  
    vim-filesystem-8.1.1602-1.amzn2.noarch  
  
src:  
    vim-8.1.1602-1.amzn2.src  
  
x86_64:  
    vim-common-8.1.1602-1.amzn2.x86_64  
    vim-minimal-8.1.1602-1.amzn2.x86_64  
    vim-enhanced-8.1.1602-1.amzn2.x86_64  
    vim-X11-8.1.1602-1.amzn2.x86_64  
    vim-debuginfo-8.1.1602-1.amzn2.x86_64  

Additional References

Red Hat: CVE-2019-12735

Mitre: CVE-2019-12735

8.6 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

9 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

71.3%