8.6 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.003 Low
EPSS
Percentile
71.3%
Debian Security Advisory DSA-4467-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
June 18, 2019 https://www.debian.org/security/faq
Package : vim
CVE ID : CVE-2019-12735
User "Arminius" discovered a vulnerability in Vim, an enhanced version of the
standard UNIX editor Vi (Vi IMproved). The "Common vulnerabilities and
exposures project" identifies the following problem:
Editors typically provide a way to embed editor configuration commands (aka
modelines) which are executed once a file is opened, while harmful commands
are filtered by a sandbox mechanism. It was discovered that the "source"
command (used to include and execute another file) was not filtered, allowing
shell command execution with a carefully crafted file opened in Vim.
For the stable distribution (stretch), this problem has been fixed in
version 8.0.0197-4+deb9u2.
We recommend that you upgrade your vim packages.
For the detailed security status of vim please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/vim
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | mips | neovim-dbgsym | < 0.1.7-4+deb9u1 | neovim-dbgsym_0.1.7-4+deb9u1_mips.deb |
Debian | 9 | mips | xxd | < 2:8.0.0197-4+deb9u2 | xxd_2:8.0.0197-4+deb9u2_mips.deb |
Debian | 9 | armhf | vim-gtk3 | < 2:8.0.0197-4+deb9u2 | vim-gtk3_2:8.0.0197-4+deb9u2_armhf.deb |
Debian | 9 | i386 | vim-dbgsym | < 2:8.0.0197-4+deb9u2 | vim-dbgsym_2:8.0.0197-4+deb9u2_i386.deb |
Debian | 9 | armhf | vim | < 2:8.0.0197-4+deb9u2 | vim_2:8.0.0197-4+deb9u2_armhf.deb |
Debian | 9 | s390x | vim-nox-dbgsym | < 2:8.0.0197-4+deb9u2 | vim-nox-dbgsym_2:8.0.0197-4+deb9u2_s390x.deb |
Debian | 9 | arm64 | neovim-dbgsym | < 0.1.7-4+deb9u1 | neovim-dbgsym_0.1.7-4+deb9u1_arm64.deb |
Debian | 9 | mipsel | neovim-dbgsym | < 0.1.7-4+deb9u1 | neovim-dbgsym_0.1.7-4+deb9u1_mipsel.deb |
Debian | 9 | s390x | vim-gtk-dbgsym | < 2:8.0.0197-4+deb9u2 | vim-gtk-dbgsym_2:8.0.0197-4+deb9u2_s390x.deb |
Debian | 9 | armhf | vim-nox-dbgsym | < 2:8.0.0197-4+deb9u2 | vim-nox-dbgsym_2:8.0.0197-4+deb9u2_armhf.deb |
8.6 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.003 Low
EPSS
Percentile
71.3%