Vulnerability Details : CVE-2007-2438
The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.
Exploit prediction scoring system (EPSS) score for CVE-2007-2438
Probability of exploitation activity in the next 30 days: 2.05%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 89 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2007-2438
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.6
|
HIGH | AV:N/AC:H/Au:N/C:C/I:C/A:C |
4.9
|
10.0
|
NIST |
References for CVE-2007-2438
-
http://tech.groups.yahoo.com/group/vimdev/message/46627
-
http://tech.groups.yahoo.com/group/vimannounce/message/178
-
http://www.mandriva.com/security/advisories?name=MDKSA-2007:101
- http://www.attrition.org/pipermail/vim/2007-August/001770.html
-
http://www.securityfocus.com/archive/1/467202/100/0/threaded
-
http://www.securitytracker.com/id?1018035
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9876
-
http://www.vupen.com/english/advisories/2007/1599
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/34012
-
http://attrition.org/pipermail/vim/2007-May/001614.html
-
http://marc.info/?l=vim-dev&m=117778983714029&w=2
Exploit
-
http://www.vim.org/news/news.php
- http://www.trustix.org/errata/2007/0017/
-
http://www.securityfocus.com/bid/23725
-
http://tech.groups.yahoo.com/group/vimdev/message/46645
-
http://marc.info/?l=vim-dev&m=117762581821298&w=2
-
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=238259
-
http://tech.groups.yahoo.com/group/vimdev/message/46658
- http://www.novell.com/linux/security/advisories/2007_12_sr.html
-
http://www.ubuntu.com/usn/usn-463-1
- http://www.debian.org/security/2007/dsa-1364
-
http://www.redhat.com/support/errata/RHSA-2007-0346.html
Products affected by CVE-2007-2438
- cpe:2.3:a:vim_development_group:vim:7.0:*:*:*:*:*:*:*