First published: Tue Jul 15 2008(Updated: )
Heap-based buffer overflow in the mch_expand_wildcards function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames, as demonstrated by the netrw.v3 test case.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vim | =6.2 | |
Vim | =6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3432 is classified as a high-severity vulnerability due to its ability to allow arbitrary code execution.
To fix CVE-2008-3432, upgrade Vim to version 6.4 or later where the vulnerability has been addressed.
CVE-2008-3432 affects Vim versions 6.2 and 6.3 running on Unix-like operating systems.
CVE-2008-3432 requires user assistance for exploitation, typically through crafted filenames.
The attack vector for CVE-2008-3432 involves shell metacharacters in filenames leading to a heap-based buffer overflow.