7.5
CVSSv3

CVE-2018-11319

Published: 20/05/2018 Updated: 03/10/2019
CVSS v2 Base Score: 8.5 | Impact Score: 10 | Exploitability Score: 6.8
CVSS v3 Base Score: 7.5 | Impact Score: 5.9 | Exploitability Score: 1.6
VMScore: 756
Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C

Vulnerability Summary

Syntastic (aka vim-syntastic) up to and including 3.9.0 does not properly handle searches for configuration files (it searches the current directory up to potentially the root). This improper handling might be exploited for arbitrary code execution via a malicious gcc plugin, if an attacker has write access to a directory that is a parent of the base directory of the project being checked. NOTE: exploitation is more difficult after 3.8.0 because filename prediction may be needed.

Vulnerable Product Search on Vulmon Subscribe to Product

syntastic project syntastic

debian debian linux 8.0

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #894736 vim-syntastic: CVE-2018-11319: Checker config files allow arbitrary code execution scenarios Package: vim-syntastic; Maintainer for vim-syntastic is Andrea Capriotti <capriott@debianorg>; Source for vim-syntastic is src:vim-syntastic (PTS, buildd, popcon) Reported by: Enrico Zini <enrico@ ...