lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
From: martin.pitt at (Martin Pitt)
Subject: [USN-52-1] vim vulnerability

Ubuntu Security Notice USN-52-1		  December 23, 2004
vim vulnerability

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)

The following packages are affected:


The problem can be corrected by upgrading the affected package to
version 1:6.3-025+1ubuntu2.1.  In general, a standard system upgrade is
sufficient to effect the necessary changes.

Details follow:

Ciaran McCreesh found several vulnerabilities related to the use of
options in Vim modeline commands, such as 'termcap', 'printdevice',
'titleold', 'filetype', 'syntax', 'backupext', 'keymap', 'patchmode',
and 'langmenu'.

If an attacker tricked an user to open a file with a specially crafted
modeline, he could exploit this to execute arbitrary commands with the
user's privileges.

  Source archives:
      Size/MD5:   424979 4965410b651e6f5ac01ba2500e45d1ad
      Size/MD5:     1122 fbabe18da525c6874e00e7144dc1015f
      Size/MD5:  5624622 de1c964ceedbc13538da87d2d73fd117

  Architecture independent packages:
      Size/MD5:  3421062 5e19fadc78b2d58baf8b9c0e469bffe9
      Size/MD5:  1646594 0aacbc8f415aac67d4ff67c2567ea9fc

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)
      Size/MD5:     2586 dffb544da03f75c78a04240c1a226034
      Size/MD5:   805718 684db5c3346c4369b47131fa1e12130e
      Size/MD5:   802444 d62cb45626f58a3d04286734c9f0fff4
      Size/MD5:   784098 b6023cf232ce1177206aebc3a002ea10
      Size/MD5:   809126 2414707b703fb83ac166eef291e00f14
      Size/MD5:   802464 f9fc02b7e2bddaf8c579b88556b49e52
      Size/MD5:   801154 63c0de866afbe3e898c22dd1c571e4f9
      Size/MD5:   764954 4efd27d92715dd0b3d518b85a5fdaa23

  i386 architecture (x86 compatible Intel/AMD)
      Size/MD5:     2590 d66ae294e991c2a7795800ce109c4ed2
      Size/MD5:   702646 0b2b804684a446045fc7b459f80b1c33
      Size/MD5:   699996 38435bc2a97e3dae68aeacb41aa6ee46
      Size/MD5:   682456 7346dca98d32990cbda11b28dcf9de98
      Size/MD5:   707678 0cebe040f27ff421c046c0bba0c7be5a
      Size/MD5:   700016 218129f6116b1ed0cac566b4ed3bb91a
      Size/MD5:   699624 8f41f595aeb4b798b932cafdae5b428c
      Size/MD5:   680000 648b6f8d31502eb282c6c8e598b1bfb3

  powerpc architecture (Apple Macintosh G3/G4/G5)
      Size/MD5:     2594 9b73d310934283adb3443ba1cf698cfc
      Size/MD5:   788010 a0fb73fac7af675b50670878eff5e7a1
      Size/MD5:   785336 fa097c36bb3fbdde3cc61131e06894b3
      Size/MD5:   769820 960874ca1a9d2f184fb70a7c67712ff2
      Size/MD5:   792352 33cdd008c6f7ee7ce5b7eb207e3a23d3
      Size/MD5:   785350 f9ea0ded3300b32c8f464469666a2739
      Size/MD5:   784864 1b286b54ecb25d6aa7b611122c5ad7b3
      Size/MD5:   754470 04d272608873af561b091de313b7167c
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url :

Powered by blists - more mailing lists