Packages
- vim -
Details
Jan Minar discovered that Vim did not properly sanitize inputs before invoking
the execute or system functions inside Vim scripts. If a user were tricked
into running Vim scripts with a specially crafted input, an attacker could
execute arbitrary code with the privileges of the user invoking the program.
(CVE-2008-2712)
Ben Schmidt discovered that Vim did not properly escape characters when
performing keyword or tag lookups. If a user were tricked into running specially
crafted commands, an attacker could execute arbitrary code with the privileges
of the user invoking the program. (CVE-2008-4101)
Jan Minar discovered that Vim did not properly sanitize inputs before invoking
the execute or system functions inside Vim scripts. If a user were tricked
into running Vim scripts with a specially crafted input, an attacker could
execute arbitrary code with the privileges of the user invoking the program.
(CVE-2008-2712)
Ben Schmidt discovered that Vim did not properly escape characters when
performing keyword or tag lookups. If a user were tricked into running specially
crafted commands, an attacker could execute arbitrary code with the privileges
of the user invoking the program. (CVE-2008-4101)
Update instructions
In general, a standard system upgrade is sufficient to effect the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
8.10 intrepid | vim-runtime – 1:7.1.314-3ubuntu3.1 | ||
vim – 1:7.1.314-3ubuntu3.1 | |||
8.04 hardy | vim-runtime – 1:7.1-138+1ubuntu3.1 | ||
vim – 1:7.1-138+1ubuntu3.1 | |||
7.10 gutsy | vim-runtime – 1:7.1-056+2ubuntu2.1 | ||
vim – 1:7.1-056+2ubuntu2.1 | |||
6.06 dapper | vim-runtime – 1:6.4-006+2ubuntu6.2 | ||
vim – 1:6.4-006+2ubuntu6.2 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.