Vulnerability Name: | CVE-2008-3075 (CCN-47786) |
Assigned: | 2008-07-15 |
Published: | 2008-07-15 |
Updated: | 2017-09-29 |
Summary: | The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, allows user-assisted attackers to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a ZIP archive and possibly (2) the filename of the first file in a ZIP archive, which is not properly handled by zip.vim in the VIM ZIP plugin (zipPlugin.vim) v.11 through v.21, as demonstrated by the zipplugin and zipplugin.v2 test cases. Note: this issue reportedly exists because of an incomplete fix for CVE-2008-2712. Note: this issue has the same root cause as CVE-2008-3074. Note: due to the complexity of the associated disclosures and the incomplete information related to them, there may be inaccuracies in this CVE description and in external mappings to this identifier. |
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Changed
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 7.3 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 7.3 High (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-94
|
Vulnerability Consequences: | Gain Access |
References: | Source: CCN Type: Full-Disclosure Mailing List, Wed Jul 16 2008 - 06:53:00 CDT Vim: Improper Implementation of shellescape()/Arbitrary Code Execution
Source: CONFIRM Type: UNKNOWN http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506919
Source: MITRE Type: CNA CVE-2008-3075
Source: SUSE Type: UNKNOWN SUSE-SR:2009:007
Source: BUGTRAQ Type: UNKNOWN 20080701 Re: Collection of Vulnerabilities in Fully Patched Vim 7.1
Source: CCN Type: RHSA-2008-0580 Moderate: vim security update
Source: SECUNIA Type: UNKNOWN 34418
Source: CONFIRM Type: UNKNOWN http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0324
Source: DEBIAN Type: DSA-1733 vim -- several vulnerabilities
Source: MANDRIVA Type: UNKNOWN MDVSA-2008:236
Source: MLIST Type: Exploit [oss-security] 20080707 Re: More arbitrary code executions in Netrw version 125, Vim 7.2a.10
Source: MLIST Type: UNKNOWN [oss-security] 20080707 Re: More arbitrary code executions in Netrw version 125, Vim 7.2a.10
Source: MLIST Type: UNKNOWN [oss-security] 20080708 Re: More arbitrary code executions in Netrw version 125, Vim 7.2a.10
Source: MLIST Type: UNKNOWN [oss-security] 20080710 Re: Re: More arbitrary code executions in Netrw version 125, Vim 7.2a.10
Source: MLIST Type: UNKNOWN [oss-security] 20080713 Re: Re: More arbitrary code executions in Netrw version 125, Vim 7.2a.10
Source: MLIST Type: Patch [oss-security] 20080715 Re: Re: More arbitrary code executions in Netrw
Source: MLIST Type: UNKNOWN [oss-security] 20080731 Re: Re: More arbitrary code executions in Netrw version 125, Vim 7.2a.10
Source: MLIST Type: UNKNOWN [oss-security] 20081015 Vim CVE issues cleanup (plugins tar.vim, zip.vim) - CVE-2008-3074 and CVE-2008-3075
Source: MLIST Type: UNKNOWN [oss-security] 20081020 CVE request (vim)
Source: MISC Type: Exploit, Patch, Vendor Advisory http://www.rdancer.org/vulnerablevim.html
Source: REDHAT Type: UNKNOWN RHSA-2008:0580
Source: BID Type: UNKNOWN 32463
Source: CCN Type: BID-32463 Vim 'zip.vim' Plugin Arbitrary Command Execution Vulnerability
Source: CCN Type: Vim Web site welcome home : vim online
Source: CCN Type: Red Hat Bugzilla Bug 467432 Bug 467432 CVE-2008-3075 Vim zip.vim plugin: improper Implementation of shellescape() (arbitrary code execution)
Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=467432
Source: XF Type: UNKNOWN vim-zipvim-shellescape-code-execution(47786)
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10246
Source: SUSE Type: SUSE-SR:2009:007 SUSE Security Summary Report
|
Vulnerable Configuration: | Configuration 1: cpe:/a:vim:vim:7.0:*:*:*:*:*:*:*OR cpe:/a:vim:vim:7.1:*:*:*:*:*:*:*OR cpe:/a:vim:vim:7.1.266:*:*:*:*:*:*:*OR cpe:/a:vim:vim:7.1.314:*:*:*:*:*:*:*OR cpe:/a:vim:vim:7.2:*:*:*:*:*:*:*OR cpe:/a:vim:vim:7.2a.10:*:*:*:*:*:*:*OR cpe:/a:vim:zipplugin.vim:v.11:*:*:*:*:*:*:*OR cpe:/a:vim:zipplugin.vim:v.12:*:*:*:*:*:*:*OR cpe:/a:vim:zipplugin.vim:v.13:*:*:*:*:*:*:*OR cpe:/a:vim:zipplugin.vim:v.14:*:*:*:*:*:*:*OR cpe:/a:vim:zipplugin.vim:v.15:*:*:*:*:*:*:*OR cpe:/a:vim:zipplugin.vim:v.16:*:*:*:*:*:*:*OR cpe:/a:vim:zipplugin.vim:v.17:*:*:*:*:*:*:*OR cpe:/a:vim:zipplugin.vim:v.18:*:*:*:*:*:*:*OR cpe:/a:vim:zipplugin.vim:v.19:*:*:*:*:*:*:*OR cpe:/a:vim:zipplugin.vim:v.20:*:*:*:*:*:*:*OR cpe:/a:vim:zipplugin.vim:v.21:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:* Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration CCN 1: cpe:/a:vim:vim:7.2a.013:*:*:*:*:*:*:*AND cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:x86_64:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
Definition ID | Class | Title | Last Modified |
---|
oval:org.opensuse.security:def:20083075 | V | CVE-2008-3075 | 2015-11-16 | oval:org.mitre.oval:def:29232 | P | RHSA-2008:0580 -- vim security update (Moderate) | 2015-08-17 | oval:org.mitre.oval:def:7596 | P | DSA-1733 vim -- several vulnerabilities | 2015-02-23 | oval:org.mitre.oval:def:20113 | P | DSA-1733-1 vim - multiple vulnerabilities | 2014-06-23 | oval:org.mitre.oval:def:22692 | P | ELSA-2008:0580: vim security update (Moderate) | 2014-05-26 | oval:org.mitre.oval:def:10246 | V | The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, allows user-assisted attackers to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a ZIP archive and possibly (2) the filename of the first file in a ZIP archive, which is not properly handled by zip.vim in the VIM ZIP plugin (zipPlugin.vim) v.11 through v.21, as demonstrated by the zipplugin and zipplugin.v2 test cases. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-2712. NOTE: this issue has the same root cause as CVE-2008-3074. NOTE: due to the complexity of the associated disclosures and the incomplete information related to them, there may be inaccuracies in this CVE description and in external mappings to this identifier. | 2013-04-29 | oval:org.debian:def:1733 | V | several vulnerabilities | 2009-03-03 | oval:com.redhat.rhsa:def:20080580 | P | RHSA-2008:0580: vim security update (Moderate) | 2008-11-25 |
|
BACK |
vim vim 7.0
vim vim 7.1
vim vim 7.1.266
vim vim 7.1.314
vim vim 7.2
vim vim 7.2a.10
vim zipplugin.vim v.11
vim zipplugin.vim v.12
vim zipplugin.vim v.13
vim zipplugin.vim v.14
vim zipplugin.vim v.15
vim zipplugin.vim v.16
vim zipplugin.vim v.17
vim zipplugin.vim v.18
vim zipplugin.vim v.19
vim zipplugin.vim v.20
vim zipplugin.vim v.21
vim vim 7.2a.013
mandrakesoft mandrake linux corporate server 3.0
mandrakesoft mandrake multi network firewall 2.0
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
debian debian linux 4.0
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
mandrakesoft mandrake linux 2008.1 x86_64
mandrakesoft mandrake linux 2008.1
mandriva linux 2009.0
mandriva linux 2009.0 -