CVE-2008-2712

Loading...

General

Score:9.3/10.0
Severity:High
Category:Input Validation Error
Exploit:Available

Impact Metrics

Confidentiality:Complete
Integrity:Complete
Availability:Complete

Exploitability Metrics

Access Vector:Network
Access Complexity:Medium
Authentication:None

Relative vulnerabilities

CVE-2003-0063, CVE-2006-1329, CVE-2007-2691, CVE-2007-2953, CVE-2007-4850, CVE-2007-5333, CVE-2007-5342, CVE-2007-5461, CVE-2007-5969, CVE-2007-6286, CVE-2007-6420, CVE-2008-0002, CVE-2008-0226, CVE-2008-0227, CVE-2008-0564, CVE-2008-0674, CVE-2008-0888, CVE-2008-1232, CVE-2008-1389, CVE-2008-1678, CVE-2008-1767, CVE-2008-1947, CVE-2008-2079, CVE-2008-2364, CVE-2008-2370, CVE-2008-2371, CVE-2008-2938, CVE-2008-3074, CVE-2008-3075, CVE-2008-3076, CVE-2008-3294, CVE-2008-3432, CVE-2008-3641, CVE-2008-3642, CVE-2008-3643, CVE-2008-3645, CVE-2008-3646, CVE-2008-3647, CVE-2008-3912, CVE-2008-3913, CVE-2008-3914, CVE-2008-4101, CVE-2008-4211, CVE-2008-4212, CVE-2008-4214, CVE-2008-4215, CVE-2008-4456, CVE-2008-5302, CVE-2008-5303, CVE-2008-5515, CVE-2008-7247, CVE-2009-0033, CVE-2009-0037, CVE-2009-0316, CVE-2009-0580, CVE-2009-0688, CVE-2009-0689, CVE-2009-0781, CVE-2009-0783, CVE-2009-1904, CVE-2009-2042, CVE-2009-2417, CVE-2009-2422, CVE-2009-2446, CVE-2009-2632, CVE-2009-2693, CVE-2009-2801, CVE-2009-2901, CVE-2009-2902, CVE-2009-2906, CVE-2009-3009, CVE-2009-3095, CVE-2009-3557, CVE-2009-3558, CVE-2009-3559, CVE-2009-4017, CVE-2009-4019, CVE-2009-4030, CVE-2009-4142, CVE-2009-4143, CVE-2009-4214, CVE-2010-0041, CVE-2010-0042, CVE-2010-0043, CVE-2010-0055, CVE-2010-0056, CVE-2010-0057, CVE-2010-0058, CVE-2010-0059, CVE-2010-0060, CVE-2010-0062, CVE-2010-0063, CVE-2010-0064, CVE-2010-0065, CVE-2010-0393, CVE-2010-0497, CVE-2010-0498, CVE-2010-0500, CVE-2010-0501, CVE-2010-0502, CVE-2010-0503, CVE-2010-0504, CVE-2010-0505, CVE-2010-0506, CVE-2010-0507, CVE-2010-0508, CVE-2010-0509, CVE-2010-0510, CVE-2010-0511, CVE-2010-0512, CVE-2010-0513, CVE-2010-0514, CVE-2010-0515, CVE-2010-0516, CVE-2010-0517, CVE-2010-0518, CVE-2010-0519, CVE-2010-0520, CVE-2010-0521, CVE-2010-0522, CVE-2010-0523, CVE-2010-0524, CVE-2010-0525, CVE-2010-0526, CVE-2010-0533, CVE-2010-0534, CVE-2010-0535, CVE-2010-0537

Published on 16/06/08 - Updated on 01/11/18

Description

Vim 7.1.314, 6.4, and other versions allows user-assisted remote attackers to execute arbitrary commands via Vim scripts that do not properly sanitize inputs before invoking the execute or system functions, as demonstrated using (1) filetype.vim, (3) xpm.vim, (4) gzip_vim, and (5) netrw. NOTE: the originally reported version was 7.1.314, but the researcher actually found this set of issues in 7.1.298. NOTE: the zipplugin issue (originally vector 2 in this identifier) has been subsumed by CVE-2008-3075.

Category: Input Validation Error

CWE-20 (Input Validation)
The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.

Security Notices

US National Vulnerability DatabaseCVE-2008-2712
Agence Nationale de la Sécurité des Systèmes d'Information CERTA-2008-AVI-492, CERTA-2009-AVI-101, CERTA-2010-AVI-143
CentOS CESA-2008:0580, CESA-2008:0617
Redhat RHSA-2008:0580, RHSA-2008:0617, RHSA-2008:0618
Renater 2008/VULN417, 2010/VULN102

Exploits

Exploit-DBEDB-31911
SecurityFocusBID-29715

Relative technologies

VendorProduct
canonicalubuntu_linux
vimvim

Share this vulnerability with:

Twitter Facebook LinkedIn Mail