what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SCOSA-2006.13.txt

SCOSA-2006.13.txt
Posted Mar 21, 2006
Authored by SCO | Site sco.com

SCO Security Advisory - SCOSA-2006.13 - Vim is susceptible to an arbitrary command execution vulnerability with ModeLines. This issue is due to insufficient sanitization of user-supplied input.

tags | advisory, arbitrary
SHA-256 | 045df8e15e8974f0ee7a35d6f5a30b98ba9803981c87de92add7de742b49f595

SCOSA-2006.13.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

SCO Security Advisory

Subject: OpenServer 6.0.0 : Vim ModeLines Further Variant Arbitrary Command Execution Vulnerability
Advisory number: SCOSA-2006.13
Issue date: 2006 March 16
Cross reference: fz533037
CVE-2005-2368
______________________________________________________________________________


1. Problem Description

Vim is susceptible to an arbitrary command execution
vulnerability with ModeLines. This issue is due to insufficient
sanitization of user-supplied input.

By modifying a text file to include ModeLines containing the
'glob()', or 'expand()' functions with shell metacharacters,
attackers may cause arbitrary commands to be executed.

This vulnerability allows an attacker to execute arbitrary
commands with the privileges of the vim user. This gives
an attacker the ability to gain remote access to computers
running the vulnerable software.

The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2005-2368 to
this issue.


2. Vulnerable Supported Versions

System Binaries
----------------------------------------------------------------------
OpenServer 6.0.0 vim package


3. Solution

The proper solution is to install the latest packages.


4. OpenServer 6.0.0

4.1 Location of Fixed Binaries

ftp://ftp.sco.com/pub/openserver6/600/mp/osr600mp2/osr600mp2.iso


4.2 Verification

MD5 (osr600mp2.iso) = 7e560dcde374eb60df2b4a599ac20d8a

md5 is available for download from
ftp://ftp.sco.com/pub/security/tools


4.3 Installing Fixed Binaries

See the SCO OpenServer Release 6.0.0 Maintenance Pack 2 Release
and Installation Notes:

ftp://ftp.sco.com/pub/openserver6/600/mp/osr600mp2/osr600mp2.html


5. References

Specific references for this advisory:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2368
http://www.securityfocus.com/bid/14374

SCO security resources:
http://www.sco.com/support/security/index.html

SCO security advisories via email
http://www.sco.com/support/forums/security.html

This security fix closes SCO incidents fz533037.


6. Disclaimer

SCO is not responsible for the misuse of any of the information
we provide on this website and/or through our security
advisories. Our advisories are a service to our customers intended
to promote secure installation and use of SCO products.


7. Acknowledgments

Discovery of this issue is credited to Georgi Guninski.
http://www.guninski.com/


______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (SCO_SV)

iD8DBQFEGbnoaqoBO7ipriERAs1SAJ9Xqgfah0YmwSGNsOF8noRa9DOIRACfWU4d
mu7UzRh6yVSqBY1qDXfge9Y=
=jHsA
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close