- Issued:
- 2008-11-25
- Updated:
- 2008-11-25
RHSA-2008:0618 - Security Advisory
Synopsis
Moderate: vim security update
Type/Severity
Security Advisory: Moderate
Topic
Updated vim packages that fix security issues are now available for Red Hat
Enterprise Linux 2.1.
This update has been rated as having moderate security impact by the Red Hat
Security Response Team.
Description
Vim (Visual editor IMproved) is an updated and improved version of the vi
editor.
Several input sanitization flaws were found in Vim's keyword and tag
handling. If Vim looked up a document's maliciously crafted tag or keyword,
it was possible to execute arbitrary code as the user running Vim.
(CVE-2008-4101)
Several input sanitization flaws were found in various Vim system
functions. If a user opened a specially crafted file, it was possible to
execute arbitrary code as the user running Vim. (CVE-2008-2712)
All Vim users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 2 ia64
- Red Hat Enterprise Linux Server 2 i386
- Red Hat Enterprise Linux Workstation 2 ia64
- Red Hat Enterprise Linux Workstation 2 i386
Fixes
- BZ - 451759 - CVE-2008-2712 vim: command execution via scripts not sanitizing inputs to execute and system
- BZ - 461927 - CVE-2008-4101 vim: arbitrary code execution in commands: K, Control-], g]
References
(none)
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.