Upstream information
Description
The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
National Vulnerability Database | |
---|---|
Base Score | 7.6 |
Vector | AV:N/AC:H/Au:N/C:C/I:C/A:C |
Access Vector | Network |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | Complete |
Integrity Impact | Complete |
Availability Impact | Complete |
SUSE Security Advisories:
- SUSE-SR:2007:012, published Fri, 25 May 2007 17:00:00 +0000
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
SUSE Linux Enterprise Micro 6.0 |
| Patchnames: SUSE Linux Enterprise Micro 6.0 GA vim-data-common-9.1.0111-1.2 |
SUSE Linux Enterprise Micro 6.1 |
| Patchnames: SUSE Linux Enterprise Micro 6.1 GA vim-data-common-9.1.0330-slfo.1.1_1.2 |
SUSE Linux Enterprise Server 11 SP1 |
| Patchnames: SUSE Linux Enterprise Server 11 SP1 GA gvim-7.2-8.8 |
SUSE Linux Enterprise Server 11 SP2 |
| Patchnames: SUSE Linux Enterprise Server 11 SP2 GA gvim-7.2-8.15.2 |
SUSE Linux Enterprise Server 11 SP3 |
| Patchnames: SUSE Linux Enterprise Server 11 SP3 GA gvim-7.2-8.15.2 |
SUSE Linux Enterprise Server 11 SP4 |
| Patchnames: SUSE Linux Enterprise Server 11 SP4 GA gvim-7.2-8.15.2 |
openSUSE Tumbleweed |
| Patchnames: openSUSE-Tumbleweed-2024-11497 |
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 03:24:35 2013CVE page last modified: Sat Nov 23 13:11:51 2024