Vulnerability Details : CVE-2008-3075
The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, allows user-assisted attackers to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a ZIP archive and possibly (2) the filename of the first file in a ZIP archive, which is not properly handled by zip.vim in the VIM ZIP plugin (zipPlugin.vim) v.11 through v.21, as demonstrated by the zipplugin and zipplugin.v2 test cases. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-2712. NOTE: this issue has the same root cause as CVE-2008-3074. NOTE: due to the complexity of the associated disclosures and the incomplete information related to them, there may be inaccuracies in this CVE description and in external mappings to this identifier.
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2008-3075
Probability of exploitation activity in the next 30 days: 0.85%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 80 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-3075
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2008-3075
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-3075
-
http://www.rdancer.org/vulnerablevim.html
Exploit;Patch;Vendor Advisory
- http://www.openwall.com/lists/oss-security/2008/07/13/1
-
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2009:007 - openSUSE Security Announce - openSUSE Mailing Lists
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506919
- http://www.openwall.com/lists/oss-security/2008/07/07/4
- http://www.openwall.com/lists/oss-security/2008/10/20/2
- http://www.openwall.com/lists/oss-security/2008/07/15/4
-
http://www.securityfocus.com/bid/32463
- http://www.openwall.com/lists/oss-security/2008/10/15/1
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10246
- http://www.openwall.com/lists/oss-security/2008/07/08/12
- http://www.redhat.com/support/errata/RHSA-2008-0580.html
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0324
- http://www.openwall.com/lists/oss-security/2008/08/01/1
- http://marc.info/?l=bugtraq&m=121494431426308&w=2
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
- http://www.openwall.com/lists/oss-security/2008/07/10/7
-
https://bugzilla.redhat.com/show_bug.cgi?id=467432
-
http://www.openwall.com/lists/oss-security/2008/07/07/1
Exploit
Products affected by CVE-2008-3075
- cpe:2.3:a:vim:vim:7.2:*:*:*:*:*:*:*
- cpe:2.3:a:vim:vim:7.1:*:*:*:*:*:*:*
- cpe:2.3:a:vim:vim:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:vim:vim:7.1.314:*:*:*:*:*:*:*
- cpe:2.3:a:vim:vim:7.1.266:*:*:*:*:*:*:*
- cpe:2.3:a:vim:vim:7.2a.10:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.19:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.18:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.15:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.14:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.13:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.17:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.16:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.21:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.20:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.12:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.11:*:*:*:*:*:*:*