Vulnerability Description
The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Foresight Linux | Foresight Linux | 1.1 |
| Vim Development Group | Vim | 7.0 |
References
- http://attrition.org/pipermail/vim/2007-May/001614.html
- http://marc.info/?l=vim-dev&m=117762581821298&w=2
- http://marc.info/?l=vim-dev&m=117778983714029&w=2Exploit
- http://osvdb.org/36250
- http://secunia.com/advisories/25024Vendor Advisory
- http://secunia.com/advisories/25159Vendor Advisory
- http://secunia.com/advisories/25182Vendor Advisory
- http://secunia.com/advisories/25255Vendor Advisory
- http://secunia.com/advisories/25367
- http://secunia.com/advisories/25432
- http://secunia.com/advisories/26653
- http://tech.groups.yahoo.com/group/vimannounce/message/178
- http://tech.groups.yahoo.com/group/vimdev/message/46627
- http://tech.groups.yahoo.com/group/vimdev/message/46645
- http://tech.groups.yahoo.com/group/vimdev/message/46658
FAQ
What is CVE-2007-2438?
CVE-2007-2438 is a vulnerability with a CVSS score of 7.6 (HIGH). The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.
How severe is CVE-2007-2438?
CVE-2007-2438 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-2438?
Check the references section above for vendor advisories and patch information. Affected products include: Foresight Linux Foresight Linux, Vim Development Group Vim.