[Forgot Password]
Login  Register Subscribe

23631

 
 

117687

 
 

98250

 
 

909

 
 

79198

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-3432

Date: (C)2008-10-10   (M)2017-10-04 


Heap-based buffer overflow in the mch_expand_wildcards function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames, as demonstrated by the netrw.v3 test case.

CVSS Score: 6.8Access Vector: NETWORK
Exploit Score: 8.6Access Complexity: MEDIUM
Impact Score: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL





Reference:
http://www.securityfocus.com/archive/1/archive/1/502322/100/0/threaded
BID-30648
BID-31681
SECUNIA-32222
SECUNIA-32858
SECUNIA-33410
ADV-2008-2780
ADV-2009-0033
ADV-2009-0904
APPLE-SA-2008-10-09
RHSA-2008:0617
http://www.openwall.com/lists/oss-security/2008/07/15/4
http://www.openwall.com/lists/oss-security/2008/08/01/1
ftp://ftp.vim.org/pub/vim/patches/6.2.429
ftp://ftp.vim.org/pub/vim/patches/6.3/6.3.059
http://support.apple.com/kb/HT3216
http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm
http://www.vmware.com/security/advisories/VMSA-2009-0004.html
https://bugzilla.redhat.com/show_bug.cgi?id=455455
vim-mchexpandwildcards-bo(44722)

CPE    1
cpe:/a:vim:vim:6.3
CWE    1
CWE-119

© 2013 SecPod Technologies