CVE-2008-3076

NameCVE-2008-3076
DescriptionThe Netrw plugin 125 in netrw.vim in Vim 7.2a.10 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames used by the execute and system functions within the (1) mz and (2) mc commands, as demonstrated by the netrw.v2 and netrw.v3 test cases. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-2712.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-1733-1
NVD severityhigh (attack range: remote)
Debian Bugs506919

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
vim (PTS)wheezy2:7.3.547-7fixed
wheezy (security)2:7.3.547-7+deb7u1fixed
jessie2:7.4.488-7fixed
jessie (security)2:7.4.488-7+deb8u1fixed
stretch, sid2:8.0.0095-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
vimsource(unstable)2:7.2.010-1high506919
vimsourceetch1:7.0-122+1etch5highDSA-1733-1
vimsourcelenny1:7.1.314-3+lenny1high506919
vimsourcesqueeze1:7.1.314-3+lenny1high506919

Search for package or bug name: Reporting problems