aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorshaun <shaun@FreeBSD.org>2010-09-09 11:13:09 +0800
committershaun <shaun@FreeBSD.org>2010-09-09 11:13:09 +0800
commit0b6c96eed40c8db6bef099ebed1ab15baa06de7e (patch)
tree9384db763944dd1e8e9f1adcd1d426859a0b831f /security
parente670c15e82acbda1996cff7360482e4e65fdf9c4 (diff)
downloadfreebsd-ports-gnome-0b6c96eed40c8db6bef099ebed1ab15baa06de7e.tar.gz
freebsd-ports-gnome-0b6c96eed40c8db6bef099ebed1ab15baa06de7e.tar.zst
freebsd-ports-gnome-0b6c96eed40c8db6bef099ebed1ab15baa06de7e.zip
Belatedly (and perhaps pointlessly) document [1]:
vim6 -- heap-based overflow while parsing shell metacharacters While here, prepare this old port for termination with DEPRECATED. PR: ports/129300 [1] Submitted by: Eygene Ryabinkin <rea-fbsd@codelabs.ru> [1]
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml30
1 files changed, 30 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index e04096026661..f639e5f925dd 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,36 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="f866d2af-bbba-11df-8a8d-0008743bf21a">
+ <topic>vim6 -- heap-based overflow while parsing shell metacharacters</topic>
+ <affects>
+ <package>
+ <name>vim6</name>
+ <name>vim6+ruby</name>
+ <range><ge>6.2.429</ge><lt>6.3.62</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Description for CVE-2008-3432 says:</p>
+ <blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3432">
+ <p>Heap-based buffer overflow in the mch_expand_wildcards
+ function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted
+ attackers to execute arbitrary code via shell metacharacters
+ in filenames, as demonstrated by the netrw.v3 test case.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2008-3432</cvename>
+ <url>http://www.openwall.com/lists/oss-security/2008/07/15/4</url>
+ </references>
+ <dates>
+ <discovery>2008-07-31</discovery>
+ <entry>2010-09-09</entry>
+ </dates>
+ </vuln>
+
<vuln vid="4a21ce2c-bb13-11df-8e32-000f20797ede">
<topic>mozilla -- multiple vulnerabilities</topic>
<affects>