Vulnerability Details : CVE-2008-3075
Potential exploit
The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, allows user-assisted attackers to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a ZIP archive and possibly (2) the filename of the first file in a ZIP archive, which is not properly handled by zip.vim in the VIM ZIP plugin (zipPlugin.vim) v.11 through v.21, as demonstrated by the zipplugin and zipplugin.v2 test cases. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-2712. NOTE: this issue has the same root cause as CVE-2008-3074. NOTE: due to the complexity of the associated disclosures and the incomplete information related to them, there may be inaccuracies in this CVE description and in external mappings to this identifier.
Vulnerability category: Execute code
Products affected by CVE-2008-3075
- cpe:2.3:a:vim:vim:7.2:*:*:*:*:*:*:*
- cpe:2.3:a:vim:vim:7.1:*:*:*:*:*:*:*
- cpe:2.3:a:vim:vim:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:vim:vim:7.1.314:*:*:*:*:*:*:*
- cpe:2.3:a:vim:vim:7.1.266:*:*:*:*:*:*:*
- cpe:2.3:a:vim:vim:7.2a.10:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.19:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.18:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.15:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.14:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.13:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.17:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.16:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.21:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.20:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.12:*:*:*:*:*:*:*
- cpe:2.3:a:vim:zipplugin.vim:v.11:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-3075
5.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-3075
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2008-3075
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-3075
-
http://www.rdancer.org/vulnerablevim.html
Exploit;Patch;Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2008/07/13/1
oss-security - Re: Re: More arbitrary code executions in Netrw version 125, Vim 7.2a.10
-
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2009:007 - openSUSE Security Announce - openSUSE Mailing Lists
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506919
#506919 - vim: multiple vulnerabilities (CVE-2008-3074, CVE-2008-3075, and CVE-2008-3076) - Debian Bug report logs
-
http://www.openwall.com/lists/oss-security/2008/07/07/4
oss-security - Re: More arbitrary code executions in Netrw version 125, Vim 7.2a.10
-
http://www.openwall.com/lists/oss-security/2008/10/20/2
oss-security - CVE request (vim)
-
http://www.openwall.com/lists/oss-security/2008/07/15/4
oss-security - Re: Re: More arbitrary code executions in Netrw version 125, Vim 7.2a.10Patch
-
http://www.securityfocus.com/bid/32463
-
http://www.openwall.com/lists/oss-security/2008/10/15/1
oss-security - Vim CVE issues cleanup (plugins tar.vim, zip.vim) - CVE-2008-3074 and CVE-2008-3075
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10246
404 Not Found
-
http://www.openwall.com/lists/oss-security/2008/07/08/12
oss-security - Re: More arbitrary code executions in Netrw version 125, Vim 7.2a.10
-
http://www.redhat.com/support/errata/RHSA-2008-0580.html
Support
-
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0324
-
http://www.openwall.com/lists/oss-security/2008/08/01/1
oss-security - Re: Re: More arbitrary code executions in Netrw version 125, Vim 7.2a.10
-
http://marc.info/?l=bugtraq&m=121494431426308&w=2
'Re: Collection of Vulnerabilities in Fully Patched Vim 7.1' - MARC
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
Mandriva
-
http://www.openwall.com/lists/oss-security/2008/07/10/7
oss-security - Re: Re: More arbitrary code executions in Netrw version 125, Vim 7.2a.10
-
https://bugzilla.redhat.com/show_bug.cgi?id=467432
467432 – (CVE-2008-3075) CVE-2008-3075 Vim zip.vim plugin: improper Implementation of shellescape() (arbitrary code execution)
-
http://www.openwall.com/lists/oss-security/2008/07/07/1
oss-security - Re: More arbitrary code executions in Netrw version 125, Vim 7.2a.10Exploit
-
http://secunia.com/advisories/34418
About Secunia Research | Flexera
Jump to