Vulnerability Details : CVE-2008-3074
The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, allows user-assisted attackers to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a tar archive and possibly (2) the filename of the first file in a tar archive, which is not properly handled by the VIM TAR plugin (tar.vim) v.10 through v.22, as demonstrated by the shellescape, tarplugin.v2, tarplugin, and tarplugin.updated test cases. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-2712. NOTE: this issue has the same root cause as CVE-2008-3075. NOTE: due to the complexity of the associated disclosures and the incomplete information related to them, there may be inaccuracies in this CVE description and in external mappings to this identifier.
Vulnerability category: Execute code
Products affected by CVE-2008-3074
- cpe:2.3:a:vim:vim:7.2:*:*:*:*:*:*:*
- cpe:2.3:a:vim:vim:7.1:*:*:*:*:*:*:*
- cpe:2.3:a:vim:vim:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:vim:vim:7.1.314:*:*:*:*:*:*:*
- cpe:2.3:a:vim:vim:7.1.266:*:*:*:*:*:*:*
- cpe:2.3:a:vim:tar.vim:v.12:*:*:*:*:*:*:*
- cpe:2.3:a:vim:tar.vim:v.13:*:*:*:*:*:*:*
- cpe:2.3:a:vim:tar.vim:v.20:*:*:*:*:*:*:*
- cpe:2.3:a:vim:tar.vim:v.21:*:*:*:*:*:*:*
- cpe:2.3:a:vim:tar.vim:v.16:*:*:*:*:*:*:*
- cpe:2.3:a:vim:tar.vim:v.17:*:*:*:*:*:*:*
- cpe:2.3:a:vim:tar.vim:v.14:*:*:*:*:*:*:*
- cpe:2.3:a:vim:tar.vim:v.15:*:*:*:*:*:*:*
- cpe:2.3:a:vim:tar.vim:v.22:*:*:*:*:*:*:*
- cpe:2.3:a:vim:tar.vim:v.10:*:*:*:*:*:*:*
- cpe:2.3:a:vim:tar.vim:v.11:*:*:*:*:*:*:*
- cpe:2.3:a:vim:tar.vim:v.18:*:*:*:*:*:*:*
- cpe:2.3:a:vim:tar.vim:v.19:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-3074
0.59%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 75 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-3074
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2008-3074
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-3074
-
http://www.rdancer.org/vulnerablevim.html
Exploit;Patch;Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2008/07/13/1
oss-security - Re: Re: More arbitrary code executions in Netrw version 125, Vim 7.2a.10
-
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2009:007 - openSUSE Security Announce - openSUSE Mailing Lists
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506919
#506919 - vim: multiple vulnerabilities (CVE-2008-3074, CVE-2008-3075, and CVE-2008-3076) - Debian Bug report logs
-
http://www.openwall.com/lists/oss-security/2008/07/07/4
oss-security - Re: More arbitrary code executions in Netrw version 125, Vim 7.2a.10Exploit;Patch
-
http://www.openwall.com/lists/oss-security/2008/10/20/2
oss-security - CVE request (vim)
-
http://www.openwall.com/lists/oss-security/2008/07/15/4
oss-security - Re: Re: More arbitrary code executions in Netrw version 125, Vim 7.2a.10
-
http://www.openwall.com/lists/oss-security/2008/10/15/1
oss-security - Vim CVE issues cleanup (plugins tar.vim, zip.vim) - CVE-2008-3074 and CVE-2008-3075
-
http://www.openwall.com/lists/oss-security/2008/07/08/12
oss-security - Re: More arbitrary code executions in Netrw version 125, Vim 7.2a.10
-
http://www.redhat.com/support/errata/RHSA-2008-0580.html
Support
-
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0324
-
https://bugzilla.redhat.com/show_bug.cgi?id=467428
467428 – (CVE-2008-3074) CVE-2008-3074 Vim tar.vim plugin: improper Implementation of shellescape() (arbitrary code execution)
-
http://www.rdancer.org/vulnerablevim-shellescape.html
-
http://www.openwall.com/lists/oss-security/2008/08/01/1
oss-security - Re: Re: More arbitrary code executions in Netrw version 125, Vim 7.2a.10
-
http://marc.info/?l=bugtraq&m=121494431426308&w=2
'Re: Collection of Vulnerabilities in Fully Patched Vim 7.1' - MARC
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
Mandriva
-
http://www.openwall.com/lists/oss-security/2008/07/10/7
oss-security - Re: Re: More arbitrary code executions in Netrw version 125, Vim 7.2a.10
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10754
404 Not Found
-
http://www.openwall.com/lists/oss-security/2008/07/07/1
oss-security - Re: More arbitrary code executions in Netrw version 125, Vim 7.2a.10
-
http://www.securityfocus.com/bid/32462
Jump to