Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2008:0580 - Security Advisory
Issued:
2008-11-25
Updated:
2008-11-25

RHSA-2008:0580 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: vim security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated vim packages that fix security issues are now available for Red Hat
Enterprise Linux 5.

This update has been rated as having moderate security impact by the Red Hat
Security Response Team.

Description

Vim (Visual editor IMproved) is an updated and improved version of the vi
editor.

Several input sanitization flaws were found in Vim's keyword and tag
handling. If Vim looked up a document's maliciously crafted tag or keyword,
it was possible to execute arbitrary code as the user running Vim.
(CVE-2008-4101)

Multiple security flaws were found in netrw.vim, the Vim plug-in providing
file reading and writing over the network. If a user opened a specially
crafted file or directory with the netrw plug-in, it could result in
arbitrary code execution as the user running Vim. (CVE-2008-3076)

A security flaw was found in zip.vim, the Vim plug-in that handles ZIP
archive browsing. If a user opened a ZIP archive using the zip.vim plug-in,
it could result in arbitrary code execution as the user running Vim.
(CVE-2008-3075)

A security flaw was found in tar.vim, the Vim plug-in which handles TAR
archive browsing. If a user opened a TAR archive using the tar.vim plug-in,
it could result in arbitrary code execution as the user runnin Vim.
(CVE-2008-3074)

Several input sanitization flaws were found in various Vim system
functions. If a user opened a specially crafted file, it was possible to
execute arbitrary code as the user running Vim. (CVE-2008-2712)

Ulf Harnhammar, of Secunia Research, discovered a format string flaw in
Vim's help tag processor. If a user was tricked into executing the
"helptags" command on malicious data, arbitrary code could be executed with
the permissions of the user running Vim. (CVE-2007-2953)

All Vim users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.2 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.2 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 248542 - CVE-2007-2953 vim format string flaw
  • BZ - 451759 - CVE-2008-2712 vim: command execution via scripts not sanitizing inputs to execute and system
  • BZ - 461927 - CVE-2008-4101 vim: arbitrary code execution in commands: K, Control-], g]
  • BZ - 467428 - CVE-2008-3074 Vim tar.vim plugin: improper Implementation of shellescape() (arbitrary code execution)
  • BZ - 467432 - CVE-2008-3075 Vim zip.vim plugin: improper Implementation of shellescape() (arbitrary code execution)
  • BZ - 467439 - CVE-2008-3076 Vim netrw.vim plugin: lack of sanitization throughout netrw.vim can lead to arbitrary code execution

CVEs

  • CVE-2008-2712
  • CVE-2007-2953
  • CVE-2008-4101
  • CVE-2008-3075
  • CVE-2008-3074
  • CVE-2008-6235

References

  • http://www.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
vim-7.0.109-4.el5_2.4z.src.rpm SHA-256: 9159ad90614a8b6c0229c291b6faa69f78fbbac83b62a2cf8d005131e7426a09
x86_64
vim-X11-7.0.109-4.el5_2.4z.x86_64.rpm SHA-256: 7d8d437e25d3a5c980e0d5b5361f0ef06a2842f0c02a39f9ab8fa546b3b57cdc
vim-common-7.0.109-4.el5_2.4z.x86_64.rpm SHA-256: ba96af99f304eee21f29e49053d584dd00b1e5f1d182e76832be0a119b43e5cd
vim-enhanced-7.0.109-4.el5_2.4z.x86_64.rpm SHA-256: 52e5f6bf1eb2477555bf5aa63ff2f8510c0556eb44159a4b715a4ccd2303c4f6
vim-minimal-7.0.109-4.el5_2.4z.x86_64.rpm SHA-256: 9308e159b268908aa9bf14dc76d49c2f246e6aecfd560e93e72fd12317eb6527
ia64
vim-X11-7.0.109-4.el5_2.4z.ia64.rpm SHA-256: cfa4bc0b932aabd24787d83cc03f0f659e55889562022e34b27c8b72d8ee05ba
vim-common-7.0.109-4.el5_2.4z.ia64.rpm SHA-256: 2dc6c51d8d063bcdb4d2c4b4b3e765c474f1dab7bb30825536e913f498e892e2
vim-enhanced-7.0.109-4.el5_2.4z.ia64.rpm SHA-256: b8664a84a7791927406533130dd912dc54a3f4ba1c19b111badc33bb46a3e6e7
vim-minimal-7.0.109-4.el5_2.4z.ia64.rpm SHA-256: 16aff36f52567a1a47782939997c4c869097c8cbda78847539cfd4e6fd86b7e6
i386
vim-X11-7.0.109-4.el5_2.4z.i386.rpm SHA-256: b6b7a1e7f023ef452ce4b8367f909c772f7c547cabcba5fbeffb503b5530a4f7
vim-common-7.0.109-4.el5_2.4z.i386.rpm SHA-256: ce8bd289cd79a1162d0e09b00d4b994a60317a53a9e9a1b892d679a2840da060
vim-enhanced-7.0.109-4.el5_2.4z.i386.rpm SHA-256: 39ce2776b0c89930914a110aa5b5dbb3b0f3b409ae1f55dd5d25ba0a8e25c21d
vim-minimal-7.0.109-4.el5_2.4z.i386.rpm SHA-256: 31b19f4cecfc6c7c22ce61d6a37c61b2115a0171d18276d431912dabfabbe7b0

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
vim-7.0.109-4.el5_2.4z.src.rpm SHA-256: 9159ad90614a8b6c0229c291b6faa69f78fbbac83b62a2cf8d005131e7426a09
x86_64
vim-X11-7.0.109-4.el5_2.4z.x86_64.rpm SHA-256: 7d8d437e25d3a5c980e0d5b5361f0ef06a2842f0c02a39f9ab8fa546b3b57cdc
vim-common-7.0.109-4.el5_2.4z.x86_64.rpm SHA-256: ba96af99f304eee21f29e49053d584dd00b1e5f1d182e76832be0a119b43e5cd
vim-enhanced-7.0.109-4.el5_2.4z.x86_64.rpm SHA-256: 52e5f6bf1eb2477555bf5aa63ff2f8510c0556eb44159a4b715a4ccd2303c4f6
vim-minimal-7.0.109-4.el5_2.4z.x86_64.rpm SHA-256: 9308e159b268908aa9bf14dc76d49c2f246e6aecfd560e93e72fd12317eb6527
i386
vim-X11-7.0.109-4.el5_2.4z.i386.rpm SHA-256: b6b7a1e7f023ef452ce4b8367f909c772f7c547cabcba5fbeffb503b5530a4f7
vim-common-7.0.109-4.el5_2.4z.i386.rpm SHA-256: ce8bd289cd79a1162d0e09b00d4b994a60317a53a9e9a1b892d679a2840da060
vim-enhanced-7.0.109-4.el5_2.4z.i386.rpm SHA-256: 39ce2776b0c89930914a110aa5b5dbb3b0f3b409ae1f55dd5d25ba0a8e25c21d
vim-minimal-7.0.109-4.el5_2.4z.i386.rpm SHA-256: 31b19f4cecfc6c7c22ce61d6a37c61b2115a0171d18276d431912dabfabbe7b0

Red Hat Enterprise Linux Desktop 5

SRPM
vim-7.0.109-4.el5_2.4z.src.rpm SHA-256: 9159ad90614a8b6c0229c291b6faa69f78fbbac83b62a2cf8d005131e7426a09
x86_64
vim-X11-7.0.109-4.el5_2.4z.x86_64.rpm SHA-256: 7d8d437e25d3a5c980e0d5b5361f0ef06a2842f0c02a39f9ab8fa546b3b57cdc
vim-common-7.0.109-4.el5_2.4z.x86_64.rpm SHA-256: ba96af99f304eee21f29e49053d584dd00b1e5f1d182e76832be0a119b43e5cd
vim-enhanced-7.0.109-4.el5_2.4z.x86_64.rpm SHA-256: 52e5f6bf1eb2477555bf5aa63ff2f8510c0556eb44159a4b715a4ccd2303c4f6
vim-minimal-7.0.109-4.el5_2.4z.x86_64.rpm SHA-256: 9308e159b268908aa9bf14dc76d49c2f246e6aecfd560e93e72fd12317eb6527
i386
vim-X11-7.0.109-4.el5_2.4z.i386.rpm SHA-256: b6b7a1e7f023ef452ce4b8367f909c772f7c547cabcba5fbeffb503b5530a4f7
vim-common-7.0.109-4.el5_2.4z.i386.rpm SHA-256: ce8bd289cd79a1162d0e09b00d4b994a60317a53a9e9a1b892d679a2840da060
vim-enhanced-7.0.109-4.el5_2.4z.i386.rpm SHA-256: 39ce2776b0c89930914a110aa5b5dbb3b0f3b409ae1f55dd5d25ba0a8e25c21d
vim-minimal-7.0.109-4.el5_2.4z.i386.rpm SHA-256: 31b19f4cecfc6c7c22ce61d6a37c61b2115a0171d18276d431912dabfabbe7b0

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
vim-7.0.109-4.el5_2.4z.src.rpm SHA-256: 9159ad90614a8b6c0229c291b6faa69f78fbbac83b62a2cf8d005131e7426a09
s390x
vim-X11-7.0.109-4.el5_2.4z.s390x.rpm SHA-256: 5fae74e84ece6e07cfd2873ee5b1c185c721199400c11d053de5a6d6aa0ac654
vim-common-7.0.109-4.el5_2.4z.s390x.rpm SHA-256: fd7f86c4db07c7c7228aa31910c8015046bb615f28269da571fc801701a0a3ca
vim-enhanced-7.0.109-4.el5_2.4z.s390x.rpm SHA-256: cf35a479bce9c5a6b938fe0c540a99bd8bfb2a5790c59e465fefa0491cf2bfef
vim-minimal-7.0.109-4.el5_2.4z.s390x.rpm SHA-256: 097440572e79b88f1c4cbed1353b6bf43bbd4b05d8cac7dc7fa28a1cbc9146aa

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.2

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
vim-7.0.109-4.el5_2.4z.src.rpm SHA-256: 9159ad90614a8b6c0229c291b6faa69f78fbbac83b62a2cf8d005131e7426a09
ppc
vim-X11-7.0.109-4.el5_2.4z.ppc.rpm SHA-256: b7c5fcf76330a6777d75977a67ed8d0c997bfc5eb6b9028d8bc625aacb259ad6
vim-common-7.0.109-4.el5_2.4z.ppc.rpm SHA-256: f851b7b96746c0d1a1f47e51f0407d739bd49c3835fe1a21ae5251eafe1186d6
vim-enhanced-7.0.109-4.el5_2.4z.ppc.rpm SHA-256: b92300e43d2cbb554821a854515666567081412466b6eff95ee94e3fc5988e2b
vim-minimal-7.0.109-4.el5_2.4z.ppc.rpm SHA-256: 5a55872e266f0fa7eaa5a102bee9e2c796651c916d93e36a012e4e43fc7fbb63

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.2

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
vim-7.0.109-4.el5_2.4z.src.rpm SHA-256: 9159ad90614a8b6c0229c291b6faa69f78fbbac83b62a2cf8d005131e7426a09
x86_64
vim-X11-7.0.109-4.el5_2.4z.x86_64.rpm SHA-256: 7d8d437e25d3a5c980e0d5b5361f0ef06a2842f0c02a39f9ab8fa546b3b57cdc
vim-common-7.0.109-4.el5_2.4z.x86_64.rpm SHA-256: ba96af99f304eee21f29e49053d584dd00b1e5f1d182e76832be0a119b43e5cd
vim-enhanced-7.0.109-4.el5_2.4z.x86_64.rpm SHA-256: 52e5f6bf1eb2477555bf5aa63ff2f8510c0556eb44159a4b715a4ccd2303c4f6
vim-minimal-7.0.109-4.el5_2.4z.x86_64.rpm SHA-256: 9308e159b268908aa9bf14dc76d49c2f246e6aecfd560e93e72fd12317eb6527
i386
vim-X11-7.0.109-4.el5_2.4z.i386.rpm SHA-256: b6b7a1e7f023ef452ce4b8367f909c772f7c547cabcba5fbeffb503b5530a4f7
vim-common-7.0.109-4.el5_2.4z.i386.rpm SHA-256: ce8bd289cd79a1162d0e09b00d4b994a60317a53a9e9a1b892d679a2840da060
vim-enhanced-7.0.109-4.el5_2.4z.i386.rpm SHA-256: 39ce2776b0c89930914a110aa5b5dbb3b0f3b409ae1f55dd5d25ba0a8e25c21d
vim-minimal-7.0.109-4.el5_2.4z.i386.rpm SHA-256: 31b19f4cecfc6c7c22ce61d6a37c61b2115a0171d18276d431912dabfabbe7b0

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility