CVE-2008-3076

NameCVE-2008-3076
DescriptionThe Netrw plugin 125 in netrw.vim in Vim 7.2a.10 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames used by the execute and system functions within the (1) mz and (2) mc commands, as demonstrated by the netrw.v2 and netrw.v3 test cases. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-2712.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
ReferencesDSA-1733-1
NVD severityhigh (attack range: remote, user-initiated)
Debian Bugs506919
Debian/oldoldstablenot vulnerable.
Debian/oldstablenot vulnerable.
Debian/stablenot vulnerable.
Debian/testingnot vulnerable.
Debian/unstablenot vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
vim (PTS)squeeze2:7.2.445+hg~cb94c42c0e1a-1fixed
wheezy2:7.3.547-7fixed
jessie2:7.4.488-7fixed
stretch, sid2:7.4.826-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
vimsource(unstable)2:7.2.010-1high506919
vimsourceetch1:7.0-122+1etch5highDSA-1733-1
vimsourcelenny1:7.1.314-3+lenny1high506919
vimsourcesqueeze1:7.1.314-3+lenny1high506919

Search for package or bug name: Reporting problems