[olug] Security hole in vim
Mike Hostetler
thehaas at binary.net
Wed Jan 22 14:54:49 UTC 2003
----- Forwarded message from Daniel Ahlberg <aliz at gentoo.org> -----
From: Daniel Ahlberg <aliz at gentoo.org>
Date: Wed, 22 Jan 2003 12:48:17 +0100
To: gentoo-security at gentoo.org
Message-Id: <20030122114602.9BB4D5761 at mail2.tamperd.net>
Subject: [gentoo-security] GLSA: vim vim-core gvim
X-Spam-Status: No, hits=0.4 required=4.5
tests=KNOWN_MAILING_LIST,LINES_OF_YELLING,PGP_SIGNATURE,
SPAM_PHRASE_00_01
version=2.43
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - --------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200301-13
- - --------------------------------------------------------------------
PACKAGE : vim vim-core gvim
SUMMARY : arbitrary code execution
DATE : 2003-01-22 11:48 UTC
EXPLOIT : remote
- - --------------------------------------------------------------------
- From advisory:
"Opening a specially crafted text file with vim can execute arbitrary shell
commands and pass parameters to them."
Read the full advisory at
http://www.guninski.com/vim1.html
SOLUTION
It is recommended that all Gentoo Linux users who are running
affected versions of app-editors/{vim,vim-core,gvim} upgrade as follows:
emerge sync
If you are running app-editos/vim-core upgrade to vim-core-6.1-r4 :
emerge -u vim-core
If you are running app-editos/vim upgrade to vim-6.1-r19 :
emerge -u vim
If you are running app-editos/gvim upgrade to gvim-6.1-r6 :
emerge -u gvim
emerge clean
- - --------------------------------------------------------------------
aliz at gentoo.org - GnuPG key is available at www.gentoo.org/~aliz
rphillips at gentoo.org
- - --------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQE+LoUAfT7nyhUpoZMRArcGAKCAVB+gvc8+iCjOFR/HYTOmqHdVLACeIoJ1
IKN3PiG5ilVLySKq2GKA4/k=
=H+Dh
-----END PGP SIGNATURE-----
--
gentoo-security at gentoo.org mailing list
----- End forwarded message -----
--
More information about the OLUG
mailing list