| Vulnerability Name: | CVE-2018-11319 (CCN-143602) | ||||||||||||||||||||||||||||||||||||
| Assigned: | 2018-04-17 | ||||||||||||||||||||||||||||||||||||
| Published: | 2018-04-17 | ||||||||||||||||||||||||||||||||||||
| Updated: | 2019-10-03 | ||||||||||||||||||||||||||||||||||||
| Summary: | Syntastic (aka vim-syntastic) through 3.9.0 does not properly handle searches for configuration files (it searches the current directory up to potentially the root). This improper handling might be exploited for arbitrary code execution via a malicious gcc plugin, if an attacker has write access to a directory that is a parent of the base directory of the project being checked. Note: exploitation is more difficult after 3.8.0 because filename prediction may be needed. | ||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 8.5 High (CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-22 | ||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2018-11319 Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://bugs.debian.org/894736 Source: XF Type: UNKNOWN vimsyntastic-cve201811319-code-exec(143602) Source: MISC Type: Patch, Third Party Advisory https://github.com/vim-syntastic/syntastic/commit/6d7c0b394e001233dd09ec473fbea2002c72632f Source: CCN Type: syntastic GIT Repository Checker config files allow arbitrary code execution scenarios #2170 Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://github.com/vim-syntastic/syntastic/issues/2170 Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20180726 [SECURITY] [DLA 1444-1] vim-syntastic security update Source: DEBIAN Type: Third Party Advisory DSA-4261 | ||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||