|
Family: Ubuntu Local Security Checks --> Category: infos
USN52-1 : vim vulnerability Vulnerability Scan
Vulnerability Scan Summary vim vulnerability
Detailed Explanation for this Vulnerability Test
Synopsis :
These remote packages are missing security patches :
- kvim
- vim
- vim-common
- vim-doc
- vim-gnome
- vim-gtk
- vim-lesstif
- vim-perl
- vim-python
- vim-tcl
Description :
Ciaran McCreesh found several vulnerabilities related to the use of
options in Vim modeline commands, such as 'termcap', 'printdevice',
'titleold', 'filetype', 'syntax', 'backupext', 'keymap', 'patchmode',
and 'langmenu'.
If a possible hacker tricked an user to open a file with a specially crafted
modeline, he could exploit this to execute arbitrary commands with the
user's rights.
Solution :
Upgrade to :
- kvim-6.3-025+1ubuntu2.1 (Ubuntu 4.10)
- vim-6.3-025+1ubuntu2.1 (Ubuntu 4.10)
- vim-common-6.3-025+1ubuntu2.1 (Ubuntu 4.10)
- vim-doc-6.3-025+1ubuntu2.1 (Ubuntu 4.10)
- vim-gnome-6.3-025+1ubuntu2.1 (Ubuntu 4.10)
- vim-gtk-6.3-025+1ubuntu2.1 (Ubuntu 4.10)
- vim-lesstif-6.3-025+1ubuntu2.1 (Ubuntu 4.10)
- vim-perl-6.3-025+1ubuntu2.1 (Ubuntu 4.10)
- vim-python-6.3-025+1ubuntu2.1 (Ubuntu 4.10)
- vim-tcl-6.3-025+1ubuntu2.1 (Ubuntu 4.10)
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|