First published: Tue Nov 25 2008(Updated: )
Vim (Visual editor IMproved) is an updated and improved version of the vi<br>editor.<br>Several input sanitization flaws were found in Vim's keyword and tag<br>handling. If Vim looked up a document's maliciously crafted tag or keyword,<br>it was possible to execute arbitrary code as the user running Vim.<br>(CVE-2008-4101)<br>Multiple security flaws were found in netrw.vim, the Vim plug-in providing<br>file reading and writing over the network. If a user opened a specially<br>crafted file or directory with the netrw plug-in, it could result in<br>arbitrary code execution as the user running Vim. (CVE-2008-3076)<br>A security flaw was found in zip.vim, the Vim plug-in that handles ZIP<br>archive browsing. If a user opened a ZIP archive using the zip.vim plug-in,<br>it could result in arbitrary code execution as the user running Vim.<br>(CVE-2008-3075)<br>A security flaw was found in tar.vim, the Vim plug-in which handles TAR<br>archive browsing. If a user opened a TAR archive using the tar.vim plug-in,<br>it could result in arbitrary code execution as the user runnin Vim.<br>(CVE-2008-3074)<br>Several input sanitization flaws were found in various Vim system<br>functions. If a user opened a specially crafted file, it was possible to<br>execute arbitrary code as the user running Vim. (CVE-2008-2712)<br>Ulf Harnhammar, of Secunia Research, discovered a format string flaw in<br>Vim's help tag processor. If a user was tricked into executing the<br>"helptags" command on malicious data, arbitrary code could be executed with<br>the permissions of the user running Vim. (CVE-2007-2953)<br>All Vim users are advised to upgrade to these updated packages, which<br>contain backported patches to correct these issues.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/vim | <7.0.109-4.el5_2.4 | 7.0.109-4.el5_2.4 |
redhat/vim-common | <7.0.109-4.el5_2.4 | 7.0.109-4.el5_2.4 |
redhat/vim-enhanced | <7.0.109-4.el5_2.4 | 7.0.109-4.el5_2.4 |
redhat/vim-minimal | <7.0.109-4.el5_2.4 | 7.0.109-4.el5_2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.