vim: multiple vulnerabilities (CVE-2008-3074, CVE-2008-3075, and CVE-2008-3076)

Related Vulnerabilities: CVE-2008-3074   CVE-2008-3075   CVE-2008-3076  

Debian Bug report logs - #506919
vim: multiple vulnerabilities (CVE-2008-3074, CVE-2008-3075, and CVE-2008-3076)

version graph

Package: vim; Maintainer for vim is Debian Vim Maintainers <team+vim@tracker.debian.org>; Source for vim is src:vim (PTS, buildd, popcon).

Reported by: "Michael S. Gilbert" <michael.s.gilbert@gmail.com>

Date: Tue, 25 Nov 2008 22:33:01 UTC

Severity: grave

Tags: fixed, security

Found in version vim/1:6.4-000+1

Fixed in versions vim/2:7.2.010-1, vim/1:7.1.314-3+lenny1

Done: James Vega <jamessan@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian Security Team <team@security.debian.org>, Debian Testing Security Team <secure-testing-team@lists.alioth.debian.org>, Debian Vim Maintainers <pkg-vim-maintainers@lists.alioth.debian.org>:
Bug#506919; Package vim. (Tue, 25 Nov 2008 22:33:04 GMT) (full text, mbox, link).


Acknowledgement sent to "Michael S. Gilbert" <michael.s.gilbert@gmail.com>:
New Bug report received and forwarded. Copy sent to Debian Security Team <team@security.debian.org>, Debian Testing Security Team <secure-testing-team@lists.alioth.debian.org>, Debian Vim Maintainers <pkg-vim-maintainers@lists.alioth.debian.org>. (Tue, 25 Nov 2008 22:33:05 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: "Michael S. Gilbert" <michael.s.gilbert@gmail.com>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: vim: multiple vulnerabilities (CVE-2008-3074, CVE-2008-3075, and CVE-2008-3076)
Date: Tue, 25 Nov 2008 17:31:36 -0500
Package: vim
Version: 1:7.0.109
Severity: grave
Tags: security
Justification: user security hole

redhat has just released an update that fixes multiple security flaws in
vim [1].  these issues are currently reserved in the CVE tracker, but
redhat describes the probems as:

  Multiple security flaws were found in netrw.vim, the Vim plug-in providing
  file reading and writing over the network. If a user opened a specially
  crafted file or directory with the netrw plug-in, it could result in
  arbitrary code execution as the user running Vim. (CVE-2008-3076)

  A security flaw was found in zip.vim, the Vim plug-in that handles ZIP
  archive browsing. If a user opened a ZIP archive using the zip.vim plug-in,
  it could result in arbitrary code execution as the user running Vim.
  (CVE-2008-3075)

  A security flaw was found in tar.vim, the Vim plug-in which handles TAR
  archive browsing. If a user opened a TAR archive using the tar.vim plug-in,
  it could result in arbitrary code execution as the user runnin Vim.
  (CVE-2008-3074)

versions affected are unclear from the redhat notice, but the problem at 
least applies to vim version 7.0.109, which they have fixed in rhel5.

thanks for working to keep debian secure.

[1] https://rhn.redhat.com/errata/RHSA-2008-0580.html

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages vim depends on:
ii  libacl1               2.2.47-2           Access control list shared library
ii  libc6                 2.7-16             GNU C Library: Shared libraries
ii  libgpm2               1.20.4-3           General Purpose Mouse - shared lib
ii  libncurses5           5.6+20080830-1     shared libraries for terminal hand
ii  libselinux1           2.0.65-5           SELinux shared libraries
ii  vim-common            1:7.1.314-3+lenny2 Vi IMproved - Common files
ii  vim-runtime           1:7.1.314-3+lenny2 Vi IMproved - Runtime files

vim recommends no packages.

Versions of packages vim suggests:
pn  ctags                         <none>     (no description available)
pn  vim-doc                       <none>     (no description available)
pn  vim-scripts                   <none>     (no description available)

-- no debconf information




Tags added: fixed Request was from James Vega <jamessan@debian.org> to control@bugs.debian.org. (Tue, 25 Nov 2008 23:30:04 GMT) (full text, mbox, link).


Tags added: fixed Request was from James Vega <jamessan@debian.org> to control@bugs.debian.org. (Tue, 25 Nov 2008 23:30:05 GMT) (full text, mbox, link).


Reply sent to James Vega <jamessan@debian.org>:
You have taken responsibility. (Tue, 25 Nov 2008 23:30:09 GMT) (full text, mbox, link).


Notification sent to "Michael S. Gilbert" <michael.s.gilbert@gmail.com>:
Bug acknowledged by developer. (Tue, 25 Nov 2008 23:30:09 GMT) (full text, mbox, link).


Message #14 received at 506919-done@bugs.debian.org (full text, mbox, reply):

From: James Vega <jamessan@debian.org>
To: 506919-done@bugs.debian.org
Subject: Re: Bug#506919: vim: multiple vulnerabilities (CVE-2008-3074, CVE-2008-3075, and CVE-2008-3076)
Date: Tue, 25 Nov 2008 18:27:50 -0500
[Message part 1 (text/plain, inline)]
tag 506919 fixed 2:7.2.010-1
tag 506919 fixed 1:7.1.314-3+lenny1
thanks

On Tue, Nov 25, 2008 at 05:31:36PM -0500, Michael S. Gilbert wrote:
> redhat has just released an update that fixes multiple security flaws in
> vim [1].  these issues are currently reserved in the CVE tracker, but
> redhat describes the probems as:
> 
>   Multiple security flaws were found in netrw.vim, the Vim plug-in providing
>   file reading and writing over the network. If a user opened a specially
>   crafted file or directory with the netrw plug-in, it could result in
>   arbitrary code execution as the user running Vim. (CVE-2008-3076)
> 
>   A security flaw was found in zip.vim, the Vim plug-in that handles ZIP
>   archive browsing. If a user opened a ZIP archive using the zip.vim plug-in,
>   it could result in arbitrary code execution as the user running Vim.
>   (CVE-2008-3075)
> 
>   A security flaw was found in tar.vim, the Vim plug-in which handles TAR
>   archive browsing. If a user opened a TAR archive using the tar.vim plug-in,
>   it could result in arbitrary code execution as the user runnin Vim.
>   (CVE-2008-3074)
> 
> versions affected are unclear from the redhat notice, but the problem at 
> least applies to vim version 7.0.109, which they have fixed in rhel5.

These are basically split out versions of previously released
vulnerabilities.  They're fixed in the above mentioned versions.

-- 
James
GPG Key: 1024D/61326D40 2003-09-02 James Vega <jamessan@debian.org>
[signature.asc (application/pgp-signature, inline)]

Bug no longer marked as found in version 1:7.0.109. Request was from James Vega <jamessan@debian.org> to control@bugs.debian.org. (Wed, 26 Nov 2008 00:09:02 GMT) (full text, mbox, link).


Bug marked as found in version 1:6.4-000+1 and reopened. Request was from James Vega <jamessan@debian.org> to control@bugs.debian.org. (Wed, 26 Nov 2008 00:09:03 GMT) (full text, mbox, link).


Bug marked as fixed in version 2:7.2.010-1. Request was from James Vega <jamessan@debian.org> to control@bugs.debian.org. (Wed, 26 Nov 2008 00:12:06 GMT) (full text, mbox, link).


Bug marked as fixed in version 1:7.1.314-3+lenny1. Request was from James Vega <jamessan@debian.org> to control@bugs.debian.org. (Wed, 26 Nov 2008 00:12:06 GMT) (full text, mbox, link).


Bug closed, send any further explanations to "Michael S. Gilbert" <michael.s.gilbert@gmail.com> Request was from James Vega <jamessan@debian.org> to control@bugs.debian.org. (Wed, 26 Nov 2008 00:18:05 GMT) (full text, mbox, link).


Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Mon, 16 Feb 2009 07:52:01 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 18:53:09 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.