Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 245065 (CVE-2008-4677)

Summary: <app-editors/{g,}vim-7.2.182, <app-editors/vim-core-7.2.182 multiple vulnerabilities (CVE-2008-{3074,3075,3076,4677,6235})
Product: Gentoo Security Reporter: Stefan Behte (RETIRED) <craig>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: ole+gentoo, vim
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://www.openwall.com/lists/oss-security/2008/10/16/2
Whiteboard: A4 [noglsa]
Package list:
Runtime testing required: ---

Description Stefan Behte (RETIRED) gentoo-dev Security 2008-10-31 14:40:15 UTC
CVE-2008-4677 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4677):
  autoload/netrw.vim (aka the Netrw Plugin) 109, 131, and other
  versions before 133k for Vim 7.1.266, other 7.1 versions, and 7.2
  stores credentials for an FTP session, and sends those credentials
  when attempting to establish subsequent FTP sessions to servers on
  different hosts, which allows remote FTP servers to obtain sensitive
  information in opportunistic circumstances by logging usernames and
  passwords.  NOTE: the upstream vendor disputes a vector involving
  different ports on the same host, stating "I'm assuming that they're
  using the same id and password on that unchanged hostname,
  deliberately."
Comment 1 Stefan Behte (RETIRED) gentoo-dev Security 2008-11-30 16:32:34 UTC
vim: *ping*
Comment 2 Stefan Behte (RETIRED) gentoo-dev Security 2009-08-08 22:29:44 UTC
CVE-2008-3076 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3076):
  The Netrw plugin 125 in netrw.vim in Vim 7.2a.10 allows user-assisted
  attackers to execute arbitrary code via shell metacharacters in
  filenames used by the execute and system functions within the (1) mz
  and (2) mc commands, as demonstrated by the netrw.v2 and netrw.v3
  test cases.  NOTE: this issue reportedly exists because of an
  incomplete fix for CVE-2008-2712.

CVE-2008-6235 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-6235):
  The Netrw plugin (netrw.vim) in Vim 7.0 and 7.1 allows user-assisted
  attackers to execute arbitrary commands via shell metacharacters in a
  filename used by the (1) "D" (delete) command or (2) b:netrw_curdir
  variable, as demonstrated using the netrw.v4 and netrw.v5 test cases.

Comment 3 Stefan Behte (RETIRED) gentoo-dev Security 2009-08-08 22:30:59 UTC
CVE-2008-3074 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3074):
  The shellescape function in Vim 7.0 through 7.2, including 7.2a.10,
  allows user-assisted attackers to execute arbitrary code via the "!"
  (exclamation point) shell metacharacter in (1) the filename of a tar
  archive and possibly (2) the filename of the first file in a tar
  archive, which is not properly handled by the VIM TAR plugin
  (tar.vim) v.10 through v.22, as demonstrated by the shellescape,
  tarplugin.v2, tarplugin, and tarplugin.updated test cases.  NOTE:
  this issue reportedly exists because of an incomplete fix for
  CVE-2008-2712. NOTE: this issue has the same root cause as
  CVE-2008-3075.  NOTE: due to the complexity of the associated
  disclosures and the incomplete information related to them, there may
  be inaccuracies in this CVE description and in external mappings to
  this identifier.

CVE-2008-3075 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3075):
  The shellescape function in Vim 7.0 through 7.2, including 7.2a.10,
  allows user-assisted attackers to execute arbitrary code via the "!"
  (exclamation point) shell metacharacter in (1) the filename of a ZIP
  archive and possibly (2) the filename of the first file in a ZIP
  archive, which is not properly handled by zip.vim in the VIM ZIP
  plugin (zipPlugin.vim) v.11 through v.21, as demonstrated by the
  zipplugin and zipplugin.v2 test cases.  NOTE: this issue reportedly
  exists because of an incomplete fix for CVE-2008-2712.  NOTE: this
  issue has the same root cause as CVE-2008-3074.  NOTE: due to the
  complexity of the associated disclosures and the incomplete
  information related to them, there may be inaccuracies in this CVE
  description and in external mappings to this identifier.

Comment 4 Sean Amoss (RETIRED) gentoo-dev Security 2012-03-09 16:57:30 UTC
GLSA vote: yes.
Comment 5 Tim Sammut (RETIRED) gentoo-dev 2012-03-11 06:55:02 UTC
GLSA Vote: yes, too. Added to existing request.
Comment 6 Sean Amoss (RETIRED) gentoo-dev Security 2014-05-31 18:26:43 UTC
This issue has been fixed since Jul 26, 2009. No GLSA will be issued.