Vulnerability Name: | CVE-2001-0409 (CCN-6628) | ||||||||
Assigned: | 2001-04-10 | ||||||||
Published: | 2001-04-10 | ||||||||
Updated: | 2017-10-10 | ||||||||
Summary: | vim (aka gvim) allows local users to modify files being edited by other users via a symlink attack on the backup and swap files, when the victim is editing the file in a world writable directory. | ||||||||
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | File Manipulation | ||||||||
References: | Source: CCN Type: Caldera International, Inc. Security Advisory CSSA-2001-014.0 vim - embedded modline exploits Source: MITRE Type: CNA CVE-2001-0409 Source: CALDERA Type: Patch, Vendor Advisory CSSA-2001-014.0 Source: SUSE Type: UNKNOWN SuSE-SA:2001:12 Source: CCN Type: OSVDB ID: 5645 Vim Symlink Modify Arbitrary File Source: CCN Type: BID-2927 Vim Swap File Race Condition Vulnerability Source: CCN Type: SuSE Security Announcement SuSE-SA:2001:012 vim/gvim Source: XF Type: UNKNOWN vim-tmp-symlink(6628) Source: XF Type: UNKNOWN vim-tmp-symlink(6628) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |