From owner-freebsd-vuxml@FreeBSD.ORG Sun Nov 30 16:30:54 2008 Return-Path: Delivered-To: freebsd-vuxml@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 9B28910656E5; Sun, 30 Nov 2008 16:30:54 +0000 (UTC) (envelope-from rea-fbsd@codelabs.ru) Received: from 0.mx.codelabs.ru (0.mx.codelabs.ru [144.206.177.45]) by mx1.freebsd.org (Postfix) with ESMTP id 4CCE98FC0C; Sun, 30 Nov 2008 16:30:54 +0000 (UTC) (envelope-from rea-fbsd@codelabs.ru) DomainKey-Signature: a=rsa-sha1; q=dns; c=simple; s=one; d=codelabs.ru; h=Received:To:Subject:From:Reply-To:Cc:X-send-pr-version:X-GNATS-Notify:Message-Id:Date; b=IlGUytw7mj+6rIkdYqycWL9b86OeHQcj3/3uWdr4WrfWgssr+tjsTA3jWJusfFPXVpKm2D+iYYx1RFLFdkp8FHSCrI6sTasdSHLkQlQ6/sRSo938mzFaVvE6mZd52bb+lR1AaBQOKsLnE+KuzXES1Kn2xLbrl1pxDGwyVBk40sg=; Received: from phoenix.codelabs.ru (ppp85-141-162-16.pppoe.mtu-net.ru [85.141.162.16]) by 0.mx.codelabs.ru with esmtps (TLSv1:CAMELLIA256-SHA:256) id 1L6pC9-000657-4m; Sun, 30 Nov 2008 19:30:53 +0300 To: FreeBSD-gnats-submit@freebsd.org From: Eygene Ryabinkin X-send-pr-version: 3.113 X-GNATS-Notify: obrien@freebsd.org Message-Id: <20081129112723.27E6BB8019@phoenix.codelabs.ru> Date: Sat, 29 Nov 2008 14:27:23 +0300 (MSK) X-Mailman-Approved-At: Sun, 30 Nov 2008 16:51:47 +0000 Cc: freebsd-vuxml@freebsd.org Subject: [vuxml] editors/vim: document CVE-2008-3432 X-BeenThere: freebsd-vuxml@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Eygene Ryabinkin List-Id: Documenting security issues in VuXML List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 30 Nov 2008 16:30:54 -0000 >Submitter-Id: current-users >Originator: Eygene Ryabinkin >Organization: Code Labs >Confidential: no >Synopsis: [vuxml] editors/vim: document CVE-2008-3432 >Severity: non-critical >Priority: medium >Category: ports >Class: sw-bug >Release: FreeBSD 7.0-STABLE amd64 >Environment: System: FreeBSD 7.0-STABLE amd64 >Description: There is CVE-2008-3432 that addresses the heap-based buffer overflow in vim 6.2 and 6.3. While these are rather dated, someone might still be using them. >How-To-Repeat: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3432 http://www.openwall.com/lists/oss-security/2008/07/15/4 >Fix: The following VuXML entry should be evaluated and added: --- vuln.xml begins here --- vim -- heap-based overflow while parsing shell metacharacters vim vim-lite vim-gtk2 vim-gnome 6.2.5216.3.62

Description for CVE-2008-3432 says:

Heap-based buffer overflow in the mch_expand_wildcards function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames, as demonstrated by the netrw.v3 test case.

CVE-2008-3432 http://www.openwall.com/lists/oss-security/2008/07/15/4 2008-07-31 today
--- vuln.xml ends here ---