First published: Tue Nov 25 2008(Updated: )
Vim (Visual editor IMproved) is an updated and improved version of the vi<br>editor.<br>Several input sanitization flaws were found in Vim's keyword and tag<br>handling. If Vim looked up a document's maliciously crafted tag or keyword,<br>it was possible to execute arbitrary code as the user running Vim.<br>(CVE-2008-4101)<br>Several input sanitization flaws were found in various Vim system<br>functions. If a user opened a specially crafted file, it was possible to<br>execute arbitrary code as the user running Vim. (CVE-2008-2712)<br>All Vim users are advised to upgrade to these updated packages, which<br>contain backported patches to correct these issues.
Affected Software | Affected Version | How to fix |
---|---|---|
Vim |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability RHSA-2008:0618 is classified as important due to its potential for arbitrary code execution.
To fix RHSA-2008:0618, update Vim to the patched version provided by your Linux distribution.
The risks include potential remote code execution if a user opens a document with a crafted tag or keyword.
RHSA-2008:0618 affects various versions of Vim prior to the security update that addresses the input sanitization flaws.
Yes, RHSA-2008:0618 specifically affects systems running Red Hat Enterprise Linux and its derivatives.