openSUSE 10 Security Update : gvim (gvim-6023)

high Nessus Plugin ID 35921

Synopsis

The remote openSUSE host is missing a security update.

Description

The VI Improved editor (vim) was updated to version 7.2.108 to fix various security problems and other bugs.

CVE-2008-4677: The netrw plugin sent credentials to all servers.
CVE-2009-0316: The python support used a search path including the current directory, allowing code injection when python code was used.
CVE-2008-2712: Arbitrary code execution in vim helper plugins filetype.vim, zipplugin, xpm.vim, gzip_vim, and netrw were fixed.
CVE-2008-3074: tarplugin code injection CVE-2008-3075: zipplugin code injection CVE-2008-3076: several netrw bugs, code injection CVE-2008-6235: code injection in the netrw plugin CVE-2008-4677:
credential disclosure by netrw plugin

Solution

Update the affected gvim packages.

Plugin Details

Severity: High

ID: 35921

File Name: suse_gvim-6023.nasl

Version: 1.11

Type: local

Agent: unix

Published: 3/13/2009

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:gvim, p-cpe:/a:novell:opensuse:vim, p-cpe:/a:novell:opensuse:vim-base, p-cpe:/a:novell:opensuse:vim-data, p-cpe:/a:novell:opensuse:vim-enhanced, cpe:/o:novell:opensuse:10.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2/25/2009

Reference Information

CVE: CVE-2008-2712, CVE-2008-3074, CVE-2008-3075, CVE-2008-3076, CVE-2008-4677, CVE-2008-6235, CVE-2009-0316

CWE: 20, 255, 78, 94