diff options
author | Remko Lodder <remko@FreeBSD.org> | 2005-07-31 11:31:52 +0000 |
---|---|---|
committer | Remko Lodder <remko@FreeBSD.org> | 2005-07-31 11:31:52 +0000 |
commit | 1053ed30f3929ed0a78d1eff70dc945bdcc36437 (patch) | |
tree | 1f512868be3a7b0801d55a8aa29af726c3836048 /security/vuxml/vuln.xml | |
parent | aad2e3143b4fb5b0b81a07302bc6c8459e692f39 (diff) |
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r-- | security/vuxml/vuln.xml | 36 |
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 7a03fc6b037a..828471352e01 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,42 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="81f127a8-0038-11da-86bc-000e0c2e438a"> + <topic>vim -- vulnerabilities in modeline handling: glob, expand</topic> + <affects> + <package> + <name>vim</name> + <name>vim-lite</name> + <name>vim+ruby</name> + <range><ge>6.3</ge><lt>6.3.82</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Georgi Guninski discovered a way to construct Vim modelines + that execute arbitrary shell commands. The vulnerability + can be exploited by including shell commands in modelines + that call the glob() or expand() functions. An attacker + could trick an user to read or edit a trojaned file with + modelines enabled, after which the attacker is able to + execute arbitrary commands with the privileges of the user.</p> + <p><strong>Note:</strong> It is generally recommended that VIM + users use <code>set nomodeline</code> in + <code>~/.vimrc</code> to avoid the possibility of trojaned + text files.</p> + </body> + </description> + <references> + <bid>14374</bid> + <cvename>CAN-2005-2368</cvename> + <url>http://www.guninski.com/where_do_you_want_billg_to_go_today_5.html</url> + </references> + <dates> + <discovery>2005-07-25</discovery> + <entry>2005-07-29</entry> + </dates> + </vuln> + <vuln vid="68222076-010b-11da-bc08-0001020eed82"> <topic>tiff -- buffer overflow vulnerability</topic> <affects> |