|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2005-2368: vim modeline vuln again | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Ludwig Nussel <lnussel> |
| Component: | Incidents | Assignee: | Mads Martin Joergensen <mmj> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | All | ||
| Whiteboard: | CVE-2005-2368: CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Ludwig Nussel
2005-07-25 16:09:52 UTC
Candidate: CAN-2005-2368 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2368 Reference: FULLDISC:20050725 Help poor children in Uganda Reference: URL:http://lists.grok.org.uk/pipermail/full-disclosure/2005-July/035402.html Reference: MISC:http://www.guninski.com/where_do_you_want_billg_to_go_today_5.html vim 6.3 before 6.3.082, with modelines enabled, allows attackers to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels. But we haven't have modelines enabled in ages? That's just to prevent everyone from beeing vulnerable by default. Yet they are useful so people who know that turn them on. Well, sure, but that's not our problem is it? Anyway--is it possible to turn on so vim asks to execute modelines? I don't know, that's what I was asking you. BTW, this bug is fixed in STABLE since July 21st. CVE-2005-2368: CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) |