Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 186877

Summary: app-editors/vim "helptags" Command Format String Vulnerability (CVE-2007-2953)
Product: Gentoo Security Reporter: Pierre-Yves Rofes (RETIRED) <py>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED DUPLICATE    
Severity: major CC: vim
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://secunia.com/advisories/25941/
Whiteboard: A2 [ebuild] p-y
Package list:
Runtime testing required: ---

Description Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-07-28 10:33:42 UTC
Secunia Research has discovered a vulnerability in Vim, which can be exploited by malicious people to compromise a vulnerable system.

A format string error in the "helptags_one()" function in src/ex_cmds.c when running the "helptags" command can be exploited to execute arbitrary code via specially crafted help files.

Successful exploitation requires that the user is tricked into running "helptags" on malicious data.

The vulnerability is confirmed in versions 6.4 and 7.1. Other versions may also be affected.

Solution:
Apply the vendor's official patch:
ftp://ftp.vim.org/pub/vim/patches/7.1/7.1.039

Do not run "helptags" on untrusted data.

Provided and/or discovered by:
Ulf Harnhammar, Secunia Research.
Comment 1 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-07-28 10:35:19 UTC
setting status and cc'ing herd. vim, please advise
Comment 2 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-07-29 21:28:26 UTC

*** This bug has been marked as a duplicate of bug 185677 ***