National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2007-2953 Detail

Description

Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the helptags command.

Source:  MITRE      Last Modified:  07/31/2007

Quick Info

CVE Dictionary Entry:
CVE-2007-2953
Original release date:
07/31/2007
Last revised:
10/10/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
6.8 MEDIUM
Vector:
(AV:N/AC:M/Au:N/C:P/I:P/A:P) (legend)
Impact Subscore:
6.4
Exploitability Subscore:
8.6
CVSS Version 2 Metrics:
Access Vector:
Network exploitable - Victim must voluntarily interact with attack mechanism
Access Complexity:
Medium
Authentication:
Not required to exploit
Impact Type:
Provides user account access, Allows partial confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service

Vendor Statements (disclaimer)

Official Statement from Red Hat (08/06/2007)

Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248542 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
ftp://ftp.vim.org/pub/vim/patches/7.1/7.1.039 Patch External Source CONFIRM ftp://ftp.vim.org/pub/vim/patches/7.1/7.1.039
http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm External Source CONFIRM http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm
http://www.attrition.org/pipermail/vim/2007-August/001770.html External Source VIM 20070823 vim editor duplicates / clarifications
http://www.debian.org/security/2007/dsa-1364 External Source DEBIAN DSA-1364
http://www.mandriva.com/security/advisories?name=MDKSA-2007:168 External Source MANDRIVA MDKSA-2007:168
http://www.mandriva.com/security/advisories?name=MDVSA-2008:236 External Source MANDRIVA MDVSA-2008:236
http://www.novell.com/linux/security/advisories/2007_18_sr.html External Source SUSE SUSE-SR:2007:018
http://www.redhat.com/support/errata/RHSA-2008-0580.html External Source REDHAT RHSA-2008:0580
http://www.redhat.com/support/errata/RHSA-2008-0617.html External Source REDHAT RHSA-2008:0617
http://www.securityfocus.com/archive/1/archive/1/475076/100/100/threaded External Source BUGTRAQ 20070730 FLEA-2007-0036-1 vim vim-minimal gvim
http://www.securityfocus.com/archive/1/archive/1/502322/100/0/threaded External Source BUGTRAQ 20090401 VMSA-2009-0004 ESX Service Console updates for openssl, bind, and vim
http://www.securityfocus.com/bid/25095 Patch External Source BID 25095
http://www.trustix.org/errata/2007/0026/ External Source TRUSTIX 2007-0026
http://www.ubuntu.com/usn/usn-505-1 External Source UBUNTU USN-505-1
http://www.vmware.com/security/advisories/VMSA-2009-0004.html External Source CONFIRM http://www.vmware.com/security/advisories/VMSA-2009-0004.html
http://www.vupen.com/english/advisories/2007/2687 External Source VUPEN ADV-2007-2687
http://www.vupen.com/english/advisories/2009/0033 External Source VUPEN ADV-2009-0033
http://www.vupen.com/english/advisories/2009/0904 External Source VUPEN ADV-2009-0904
https://exchange.xforce.ibmcloud.com/vulnerabilities/35655 External Source XF vim-helptagsone-code-execution(35655)
https://issues.rpath.com/browse/RPL-1595 External Source CONFIRM https://issues.rpath.com/browse/RPL-1595
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11549 External Source OVAL oval:org.mitre.oval:def:11549
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6463 External Source OVAL oval:org.mitre.oval:def:6463

References to Check Content

Identifier:
oval:org.mitre.oval:def:11549
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:11549
Identifier:
oval:org.mitre.oval:def:6463
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:6463

Technical Details

Vulnerability Type (View All)

Change History 4 change records found - show changes