Vulnerabilities > CVE-2007-2438 - Remote Code Execution vulnerability in VIM Development Group VIM 7.0
Summary
The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines. Successful exploitation requires that the "modelines" option is enabled and the user is tricked into opening a malicious file. The vendor has addressed this issue with the following patches: VIM Development Group VIM 7.0- VIM Development Group patch 7.0.234 ftp://ftp.vim.org/pub/vim/patches/7.0/7.0.234 VIM Development Group patch 7.0.235 ftp://ftp.vim.org/pub/vim/patches/7.0/7.0.235
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 | |
Application | 1 |
Nessus
NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-463-1.NASL description Tomas Golembiovsky discovered that some vim commands were accidentally allowed in modelines. By tricking a user into opening a specially crafted file in vim, an attacker could execute arbitrary code with user privileges. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 28063 published 2007-11-10 reporter Ubuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/28063 title Ubuntu 6.10 / 7.04 : vim vulnerability (USN-463-1) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Ubuntu Security Notice USN-463-1. The text # itself is copyright (C) Canonical, Inc. See # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered # trademark of Canonical, Inc. # include("compat.inc"); if (description) { script_id(28063); script_version("1.14"); script_cvs_date("Date: 2019/08/02 13:33:01"); script_cve_id("CVE-2007-2438"); script_xref(name:"USN", value:"463-1"); script_name(english:"Ubuntu 6.10 / 7.04 : vim vulnerability (USN-463-1)"); script_summary(english:"Checks dpkg output for updated packages."); script_set_attribute( attribute:"synopsis", value: "The remote Ubuntu host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "Tomas Golembiovsky discovered that some vim commands were accidentally allowed in modelines. By tricking a user into opening a specially crafted file in vim, an attacker could execute arbitrary code with user privileges. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://usn.ubuntu.com/463-1/" ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:vim"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:vim-common"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:vim-doc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:vim-full"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:vim-gnome"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:vim-gtk"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:vim-gui-common"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:vim-perl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:vim-python"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:vim-ruby"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:vim-runtime"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:vim-tcl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:vim-tiny"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:6.10"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:7.04"); script_set_attribute(attribute:"patch_publication_date", value:"2007/05/22"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/11/10"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"Ubuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Ubuntu Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("ubuntu.inc"); include("misc_func.inc"); if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/Ubuntu/release"); if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu"); release = chomp(release); if (! ereg(pattern:"^(6\.10|7\.04)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 6.10 / 7.04", "Ubuntu " + release); if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu); flag = 0; if (ubuntu_check(osver:"6.10", pkgname:"vim", pkgver:"1:7.0-035+1ubuntu5.1")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"vim-common", pkgver:"7.0-035+1ubuntu5.1")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"vim-doc", pkgver:"7.0-035+1ubuntu5.1")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"vim-full", pkgver:"7.0-035+1ubuntu5.1")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"vim-gnome", pkgver:"7.0-035+1ubuntu5.1")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"vim-gtk", pkgver:"7.0-035+1ubuntu5.1")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"vim-gui-common", pkgver:"7.0-035+1ubuntu5.1")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"vim-perl", pkgver:"7.0-035+1ubuntu5.1")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"vim-python", pkgver:"7.0-035+1ubuntu5.1")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"vim-ruby", pkgver:"7.0-035+1ubuntu5.1")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"vim-runtime", pkgver:"7.0-035+1ubuntu5.1")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"vim-tcl", pkgver:"7.0-035+1ubuntu5.1")) flag++; if (ubuntu_check(osver:"6.10", pkgname:"vim-tiny", pkgver:"7.0-035+1ubuntu5.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"vim", pkgver:"1:7.0-164+1ubuntu7.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"vim-common", pkgver:"7.0-164+1ubuntu7.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"vim-doc", pkgver:"7.0-164+1ubuntu7.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"vim-full", pkgver:"7.0-164+1ubuntu7.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"vim-gnome", pkgver:"7.0-164+1ubuntu7.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"vim-gtk", pkgver:"7.0-164+1ubuntu7.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"vim-gui-common", pkgver:"7.0-164+1ubuntu7.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"vim-perl", pkgver:"7.0-164+1ubuntu7.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"vim-python", pkgver:"7.0-164+1ubuntu7.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"vim-ruby", pkgver:"7.0-164+1ubuntu7.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"vim-runtime", pkgver:"7.0-164+1ubuntu7.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"vim-tcl", pkgver:"7.0-164+1ubuntu7.1")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"vim-tiny", pkgver:"7.0-164+1ubuntu7.1")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_HOLE, extra : ubuntu_report_get() ); exit(0); } else { tested = ubuntu_pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "vim / vim-common / vim-doc / vim-full / vim-gnome / vim-gtk / etc"); }
NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2007-101.NASL description A vulnerability in vim 7.0 last seen 2020-06-01 modified 2020-06-02 plugin id 25191 published 2007-05-10 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/25191 title Mandrake Linux Security Advisory : vim (MDKSA-2007:101) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Mandrake Linux Security Advisory MDKSA-2007:101. # The text itself is copyright (C) Mandriva S.A. # include("compat.inc"); if (description) { script_id(25191); script_version ("1.15"); script_cvs_date("Date: 2019/08/02 13:32:49"); script_cve_id("CVE-2007-2438"); script_xref(name:"MDKSA", value:"2007:101"); script_name(english:"Mandrake Linux Security Advisory : vim (MDKSA-2007:101)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value: "The remote Mandrake Linux host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "A vulnerability in vim 7.0's modeline processing capabilities was discovered where a user with modelines enabled could open a text file containing a carefully crafted modeline, executing arbitrary commands as the user running vim. Updated packages have been patched to prevent this issue." ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:vim-X11"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:vim-common"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:vim-enhanced"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:vim-minimal"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2007"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2007.1"); script_set_attribute(attribute:"patch_publication_date", value:"2007/05/09"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/05/10"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc."); script_family(english:"Mandriva Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux"); if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu); flag = 0; if (rpm_check(release:"MDK2007.0", reference:"vim-X11-7.0-16.1mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", reference:"vim-common-7.0-16.1mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", reference:"vim-enhanced-7.0-16.1mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", reference:"vim-minimal-7.0-16.1mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", reference:"vim-X11-7.0-16.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", reference:"vim-common-7.0-16.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", reference:"vim-enhanced-7.0-16.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", reference:"vim-minimal-7.0-16.1mdv2007.1", yank:"mdv")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family SuSE Local Security Checks NASL id SUSE_VIM-3410.NASL description Files with VIM modelines could call some unsafe VIM functions (CVE-2007-2438). Modelines are disabled in the default config (/etc/vimrc) of openSUSE though. last seen 2020-06-01 modified 2020-06-02 plugin id 27474 published 2007-10-17 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/27474 title openSUSE 10 Security Update : vim (vim-3410) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from openSUSE Security Update vim-3410. # # The text description of this plugin is (C) SUSE LLC. # include("compat.inc"); if (description) { script_id(27474); script_version ("1.12"); script_cvs_date("Date: 2019/10/25 13:36:30"); script_cve_id("CVE-2007-2438"); script_name(english:"openSUSE 10 Security Update : vim (vim-3410)"); script_summary(english:"Check for the vim-3410 patch"); script_set_attribute( attribute:"synopsis", value:"The remote openSUSE host is missing a security update." ); script_set_attribute( attribute:"description", value: "Files with VIM modelines could call some unsafe VIM functions (CVE-2007-2438). Modelines are disabled in the default config (/etc/vimrc) of openSUSE though." ); script_set_attribute(attribute:"solution", value:"Update the affected vim packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gvim"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:vim"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:vim-enhanced"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:10.2"); script_set_attribute(attribute:"patch_publication_date", value:"2007/05/24"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/10/17"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE"); if (release !~ "^(SUSE10\.2)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "10.2", release); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); ourarch = get_kb_item("Host/cpu"); if (!ourarch) audit(AUDIT_UNKNOWN_ARCH); if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch); flag = 0; if ( rpm_check(release:"SUSE10.2", reference:"gvim-7.0-36") ) flag++; if ( rpm_check(release:"SUSE10.2", reference:"vim-7.0-36") ) flag++; if ( rpm_check(release:"SUSE10.2", reference:"vim-enhanced-7.0-36") ) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gvim / vim / vim-enhanced"); }
NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2007-0346.NASL description Updated vim packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. VIM (VIsual editor iMproved) is a version of the vi editor. An arbitrary command execution flaw was found in the way VIM processes modelines. If a user with modelines enabled opened a text file containing a carefully crafted modeline, arbitrary commands could be executed as the user running VIM. (CVE-2007-2438) Users of VIM are advised to upgrade to these updated packages, which resolve this issue. Please note: this issue did not affect VIM as distributed with Red Hat Enterprise Linux 2.1, 3, or 4. last seen 2020-06-01 modified 2020-06-02 plugin id 25332 published 2007-05-25 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25332 title RHEL 5 : vim (RHSA-2007:0346) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1364.NASL description Several vulnerabilities have been discovered in the vim editor. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2007-2953 Ulf Harnhammar discovered that a format string flaw in helptags_one() from src/ex_cmds.c (triggered through the last seen 2020-06-01 modified 2020-06-02 plugin id 25964 published 2007-09-03 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25964 title Debian DSA-1364-2 : vim - several vulnerabilities NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2007-0346.NASL description From Red Hat Security Advisory 2007:0346 : Updated vim packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. VIM (VIsual editor iMproved) is a version of the vi editor. An arbitrary command execution flaw was found in the way VIM processes modelines. If a user with modelines enabled opened a text file containing a carefully crafted modeline, arbitrary commands could be executed as the user running VIM. (CVE-2007-2438) Users of VIM are advised to upgrade to these updated packages, which resolve this issue. Please note: this issue did not affect VIM as distributed with Red Hat Enterprise Linux 2.1, 3, or 4. last seen 2020-06-01 modified 2020-06-02 plugin id 67494 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67494 title Oracle Linux 5 : vim (ELSA-2007-0346) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2007-0346.NASL description Updated vim packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. VIM (VIsual editor iMproved) is a version of the vi editor. An arbitrary command execution flaw was found in the way VIM processes modelines. If a user with modelines enabled opened a text file containing a carefully crafted modeline, arbitrary commands could be executed as the user running VIM. (CVE-2007-2438) Users of VIM are advised to upgrade to these updated packages, which resolve this issue. Please note: this issue did not affect VIM as distributed with Red Hat Enterprise Linux 2.1, 3, or 4. last seen 2020-06-01 modified 2020-06-02 plugin id 25205 published 2007-05-11 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25205 title CentOS 5 : vim (CESA-2007:0346)
Oval
accepted | 2013-04-29T04:22:59.219-04:00 | ||||||||||||
class | vulnerability | ||||||||||||
contributors |
| ||||||||||||
definition_extensions |
| ||||||||||||
description | The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines. | ||||||||||||
family | unix | ||||||||||||
id | oval:org.mitre.oval:def:9876 | ||||||||||||
status | accepted | ||||||||||||
submitted | 2010-07-09T03:56:16-04:00 | ||||||||||||
title | The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines. | ||||||||||||
version | 18 |
Redhat
advisories |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
rpms |
|
References
- http://attrition.org/pipermail/vim/2007-May/001614.html
- http://marc.info/?l=vim-dev&m=117762581821298&w=2
- http://marc.info/?l=vim-dev&m=117778983714029&w=2
- http://osvdb.org/36250
- http://secunia.com/advisories/25024
- http://secunia.com/advisories/25159
- http://secunia.com/advisories/25182
- http://secunia.com/advisories/25255
- http://secunia.com/advisories/25367
- http://secunia.com/advisories/25432
- http://secunia.com/advisories/26653
- http://tech.groups.yahoo.com/group/vimannounce/message/178
- http://tech.groups.yahoo.com/group/vimdev/message/46627
- http://tech.groups.yahoo.com/group/vimdev/message/46645
- http://tech.groups.yahoo.com/group/vimdev/message/46658
- http://www.attrition.org/pipermail/vim/2007-August/001770.html
- http://www.debian.org/security/2007/dsa-1364
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:101
- http://www.novell.com/linux/security/advisories/2007_12_sr.html
- http://www.redhat.com/support/errata/RHSA-2007-0346.html
- http://www.securityfocus.com/archive/1/467202/100/0/threaded
- http://www.securityfocus.com/bid/23725
- http://www.securitytracker.com/id?1018035
- http://www.trustix.org/errata/2007/0017/
- http://www.ubuntu.com/usn/usn-463-1
- http://www.vim.org/news/news.php
- http://www.vupen.com/english/advisories/2007/1599
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=238259
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34012
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9876