FreeBSD : vim -- multiple vulnerabilities in the netrw module (0e1e3789-d87f-11dd-8ecd-00163e000016)

This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Jan Minar reports :

Applying the ``D'' to a file with a crafted file name, or inside a
directory with a crafted directory name, can lead to arbitrary code
execution.

Lack of sanitization throughout Netrw can lead to arbitrary code
execution upon opening a directory with a crafted name.

The Vim Netrw Plugin shares the FTP user name and password across all
FTP sessions. Every time Vim makes a new FTP connection, it sends the
user name and password of the previous FTP session to the FTP server.

See also :

http://www.openwall.com/lists/oss-security/2008/10/16/2
http://www.rdancer.org/vulnerablevim-netrw.html
http://www.rdancer.org/vulnerablevim-netrw.v2.html
http://www.rdancer.org/vulnerablevim-netrw.v5.html
http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html
http://www.nessus.org/u?813c72a8

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 35283 (freebsd_pkg_0e1e3789d87f11dd8ecd00163e000016.nasl)

Bugtraq ID:

CVE ID: CVE-2008-3076

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now