Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-3432

Опубликовано: 10 окт. 2008
Источник: ubuntu
Приоритет: low
EPSS Средний
CVSS2: 6.8

Описание

Heap-based buffer overflow in the mch_expand_wildcards function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames, as demonstrated by the netrw.v3 test case.

РелизСтатусПримечание
dapper

not-affected

devel

not-affected

feisty

not-affected

gutsy

not-affected

hardy

not-affected

upstream

released

7.0

Показывать по

Ссылки на источники

EPSS

Процентиль: 95%
0.17207
Средний

6.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 20 лет назад

Heap-based buffer overflow in the mch_expand_wildcards function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames, as demonstrated by the netrw.v3 test case.

nvd
почти 17 лет назад

Heap-based buffer overflow in the mch_expand_wildcards function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames, as demonstrated by the netrw.v3 test case.

debian
почти 17 лет назад

Heap-based buffer overflow in the mch_expand_wildcards function in os_ ...

github
больше 3 лет назад

Heap-based buffer overflow in the mch_expand_wildcards function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames, as demonstrated by the netrw.v3 test case.

EPSS

Процентиль: 95%
0.17207
Средний

6.8 Medium

CVSS2