|
Family: Ubuntu Local Security Checks --> Category: infos
USN61-1 : vim vulnerabilities Vulnerability Scan
Vulnerability Scan Summary vim vulnerabilities
Detailed Explanation for this Vulnerability Test
Synopsis :
These remote packages are missing security patches :
- kvim
- vim
- vim-common
- vim-doc
- vim-gnome
- vim-gtk
- vim-lesstif
- vim-perl
- vim-python
- vim-tcl
Description :
Javier Fernández-Sanguino Peña noticed that the auxillary scripts
"tcltags" and "vimspell.sh" created temporary files in an insecure
manner. This could allow a symbolic link attack to create or overwrite
arbitrary files with the rights of the user invoking the script
(either by calling it directly or by execution through vim).
Solution :
Upgrade to :
- kvim-6.3-025+1ubuntu2.2 (Ubuntu 4.10)
- vim-6.3-025+1ubuntu2.2 (Ubuntu 4.10)
- vim-common-6.3-025+1ubuntu2.2 (Ubuntu 4.10)
- vim-doc-6.3-025+1ubuntu2.2 (Ubuntu 4.10)
- vim-gnome-6.3-025+1ubuntu2.2 (Ubuntu 4.10)
- vim-gtk-6.3-025+1ubuntu2.2 (Ubuntu 4.10)
- vim-lesstif-6.3-025+1ubuntu2.2 (Ubuntu 4.10)
- vim-perl-6.3-025+1ubuntu2.2 (Ubuntu 4.10)
- vim-python-6.3-025+1ubuntu2.2 (Ubuntu 4.10)
- vim-tcl-6.3-025+1ubuntu2.2 (Ubuntu 4.10)
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|