Lucene search

K
osvGoogleOSV:DSA-1364-2
HistorySep 19, 2007 - 12:00 a.m.

vim - several vulnerabilities

2007-09-1900:00:00
Google
osv.dev
10

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.162 Low

EPSS

Percentile

95.2%

Several vulnerabilities have been discovered in the vim editor. The Common
Vulnerabilities and Exposures project identifies the following problems:

  • CVE-2007-2953
    Ulf Härnhammar discovered that a format string flaw in helptags_one() from
    src/ex_cmds.c (triggered through the helptags command) can lead to the
    execution of arbitrary code.
  • CVE-2007-2438
    Editors often provide a way to embed editor configuration commands (aka
    modelines) which are executed once a file is opened. Harmful commands
    are filtered by a sandbox mechanism. It was discovered that function
    calls to writefile(), feedkeys() and system() were not filtered, allowing
    shell command execution with a carefully crafted file opened in vim.

This updated advisory repairs issues with missing files in the packages
for the oldstable distribution (sarge) for the alpha, mips, and mipsel
architectures.

For the oldstable distribution (sarge) these problems have been fixed in
version 6.3-071+1sarge2. Sarge is not affected by CVE-2007-2438.

For the stable distribution (etch) these problems have been fixed
in version 7.0-122+1etch3.

For the unstable distribution (sid) these problems have been fixed in
version 7.1-056+1.

We recommend that you upgrade your vim packages.

CPENameOperatorVersion
vimeq1:7.0-122+1etch2

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.162 Low

EPSS

Percentile

95.2%