Lucene search

K
centosCentOS ProjectCESA-2007:0346
HistoryMay 10, 2007 - 3:37 p.m.

vim security update

2007-05-1015:37:27
CentOS Project
lists.centos.org
43

6.8 Medium

AI Score

Confidence

Low

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.018 Low

EPSS

Percentile

88.1%

CentOS Errata and Security Advisory CESA-2007:0346

VIM (VIsual editor iMproved) is a version of the vi editor.

An arbitrary command execution flaw was found in the way VIM processes
modelines. If a user with modelines enabled opened a text file containing
a carefully crafted modeline, arbitrary commands could be executed as the user
running VIM. (CVE-2007-2438)

Users of VIM are advised to upgrade to these updated packages, which
resolve this issue.

Please note: this issue did not affect VIM as distributed with Red Hat
Enterprise Linux 2.1, 3, or 4.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2007-May/075907.html
https://lists.centos.org/pipermail/centos-announce/2007-May/075908.html

Affected packages:
vim-X11
vim-common
vim-enhanced
vim-minimal

Upstream details at:
https://access.redhat.com/errata/RHSA-2007:0346

6.8 Medium

AI Score

Confidence

Low

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.018 Low

EPSS

Percentile

88.1%