9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.011 Low
EPSS
Percentile
82.5%
Norbert Tretkowski uploaded new packages for vim which fixed the
following security problems:
CVE-2008-4101, Debian Bug #500381
Vim 3.0 through 7.x before 7.2.010 does not properly escape
characters, which allows user-assisted attackers to (1) execute
arbitrary shell commands by entering a K keystroke on a line that
contains a ";" (semicolon) followed by a command, or execute arbitrary
Ex commands by entering an argument after a (2) "Ctrl-]" (control
close-square-bracket) or (3) "g]" (g close-square-bracket) keystroke
sequence, a different issue than CVE-2008-2712.
For the etch-backports distribution the problems have been fixed in
version 1:7.1.314-3+lenny2~bpo40+2.
For the lenny distribution the problems have been fixed in version
1:7.1.314-3+lenny2.
For the sid distribution the problems have been fixed in version
2:7.2.049-1.
If you don't use pinning (see [1]) you have to update the packages
manually via "apt-get -t etch-backports install <packagelist>" with the
packagelist of your installed packages affected by this update.
[1] <http://backports.org/dokuwiki/doku.php?id=instructions>
We recommend to pin the backports repository to 200 so that new versions
of installed backports will be installed automatically:
Package: *
Pin: release a=etch-backports
Pin-Priority: 200
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 5 | all | vim | < 1:7.1.314-3+lenny2 | vim_1:7.1.314-3+lenny2_all.deb |