Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-3432

Overview

Vulnerability Score 6.8 6.8
CVE Id CVE-2008-3432
Last Modified 30 Oct 2012 11:00:47
Published 10 Oct 2008 06:30:03
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2008-3432

Summary

Heap-based buffer overflow in the mch_expand_wildcards function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames, as demonstrated by the netrw.v3 test case.

Vulnerable Systems

Application

  • Vim 6.2

  • Vim 6.3


References

BID - 31681

APPLE - APPLE-SA-2008-10-09

CONFIRM - https://bugzilla.redhat.com/show_bug.cgi?id=455455

XF - vim-mchexpandwildcards-bo(44722)

VUPEN - ADV-2009-0904

VUPEN - ADV-2009-0033

VUPEN - ADV-2008-2780

CONFIRM - http://www.vmware.com/security/advisories/VMSA-2009-0004.html

BID - 30648

BUGTRAQ - 20090401 VMSA-2009-0004 ESX Service Console updates for openssl, bind, and vim

REDHAT - RHSA-2008:0617

MLIST - [oss-security] 20080731 Re: Re: More arbitrary code executions in Netrw

MLIST - [oss-security] 20080715 Re: Re: More arbitrary code executions in Netrw

CONFIRM - http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm

CONFIRM - http://support.apple.com/kb/HT3216

SECUNIA - 33410

SECUNIA - 32222

CONFIRM - ftp://ftp.vim.org/pub/vim/patches/6.3/6.3.059

CONFIRM - ftp://ftp.vim.org/pub/vim/patches/6.2.429

SECUNIA - 32858

Related Patches

Apple 2008-10-09 Security Update 2008-007 Client (Leopard)


Last Updated: 27 May 2016 10:55:04