[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [Full-disclosure] FLEA-2007-0014-1: vim
From:       Foresight Linux Essential Announcement Service
Date:       2007-04-30 17:11:52
Message-ID: 46362358.1010309 () foresightlinux ! org
[Download RAW message or body]

Foresight Linux Essential Advisory: 2007-0014-1
Published: 2007-04-30

Rating: Minor

Updated Versions:
     gvim=/foresight.rpath.org@fl:1-devel//1/7.0.235-1-1
     vim=/foresight.rpath.org@fl:1-devel//1/7.0.235-1-1
     vim-minimal=/foresight.rpath.org@fl:1-devel//1/7.0.235-1-1
     group-dist=/foresight.rpath.org@fl:1-devel//1/1.2.1-0.3-2

References:
     https://issues.rpath.com/browse/RPL-1320
     http://marc.info/?t=117762599300001&r=1&w=2

Description:
     Previous versions of the vim package allowed two functions, feedkeys() and 
writefile(), to be used in the sandbox. Functions executed via modelines in 
files being edited are verified by the sandbox; a user who is coerced into 
opening a specially-crafted file could cause the system to execute arbitrary 
shell code supplied by the attacker.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic