full-disclosure-uk May 2007 archive
Main Archive Page > Month Archives  > full-disclosure-uk archives
full-disclosure-uk: [Full-disclosure] [ MDKSA-2007:101 ] - Updat

[Full-disclosure] [ MDKSA-2007:101 ] - Updated bind packages fix vulnerability

From: <security_at_nospam>
Date: Thu May 10 2007 - 00:22:52 GMT
To: full-disclosure@lists.grok.org.uk

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


  Mandriva Linux Security Advisory MDKSA-2007:101  http://www.mandriva.com/security/
  Package : vim Date : May 9, 2007 Affected: 2007.0, 2007.1
_______________________________________________________________________

 Problem Description:  

 A vulnerability in vim 7.0's modeline processing capabilities was  discovered where a user with modelines enabled could open a text file  containing a carefully crafted modeline, executing arbitrary commands  as the user running vim.  

 Updated packages have been patched to prevent this issue.


 References:  

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2438


 

 Updated Packages:  

 Mandriva Linux 2007.0: 193c5e6f9c4b7fbd883e756fd68e9d9c 2007.0/i586/vim-X11-7.0-16.1mdv2007.0.i586.rpm 22c359a9bb903b4971c26ef8d820dd8b 2007.0/i586/vim-common-7.0-16.1mdv2007.0.i586.rpm 78b297d07af026ba2ca661af576753dd 2007.0/i586/vim-enhanced-7.0-16.1mdv2007.0.i586.rpm a308c0c95a8feeb08db2e3cd4655360c 2007.0/i586/vim-minimal-7.0-16.1mdv2007.0.i586.rpm f18e2a622218e087cdd0a91d9ae0d53e 2007.0/SRPMS/vim-7.0-16.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64: f059a28a227db17faffd2f363b42117a 2007.0/x86_64/vim-X11-7.0-16.1mdv2007.0.x86_64.rpm 64d32a388460072e1508be8c945d8409 2007.0/x86_64/vim-common-7.0-16.1mdv2007.0.x86_64.rpm aa8ce225cc3811dcb76047b65e3dd1c4 2007.0/x86_64/vim-enhanced-7.0-16.1mdv2007.0.x86_64.rpm dedd42ccd0b0a1934991d911eab9cb0a 2007.0/x86_64/vim-minimal-7.0-16.1mdv2007.0.x86_64.rpm f18e2a622218e087cdd0a91d9ae0d53e 2007.0/SRPMS/vim-7.0-16.1mdv2007.0.src.rpm

 Mandriva Linux 2007.1: ee17731cce031b58b290cf9a61c982c0 2007.1/i586/vim-X11-7.0-16.1mdv2007.1.i586.rpm c3d2fd233ac1984af174fdad6c2b4be2 2007.1/i586/vim-common-7.0-16.1mdv2007.1.i586.rpm 5bf3f905abee7a585d5b11fb2c98b2e8 2007.1/i586/vim-enhanced-7.0-16.1mdv2007.1.i586.rpm 5138b4b2c511f7608f9db5503f14c6d1 2007.1/i586/vim-minimal-7.0-16.1mdv2007.1.i586.rpm 0f068f60ab76873471ebe0992ccc5ccd 2007.1/SRPMS/vim-7.0-16.1mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64: 890a4acc16d4b59e59b721f65686b4ef 2007.1/x86_64/vim-X11-7.0-16.1mdv2007.1.x86_64.rpm e6498971d58c5fc3fbe6aac03f0ae0fe 2007.1/x86_64/vim-common-7.0-16.1mdv2007.1.x86_64.rpm 0b4f61e8c8848a10d67a822b04bea7bd 2007.1/x86_64/vim-enhanced-7.0-16.1mdv2007.1.x86_64.rpm 0776ae51087370ec5ebce9c0996ed5e8 2007.1/x86_64/vim-minimal-7.0-16.1mdv2007.1.x86_64.rpm 0f068f60ab76873471ebe0992ccc5ccd 2007.1/SRPMS/vim-7.0-16.1mdv2007.1.src.rpm
_______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi. The verification  of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security. You can obtain the  GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com


 Type Bits/KeyID Date User ID
 pub 1024D/22458A98 2000-07-10 Mandriva Security Team   <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFGQjuFmqjQ0CJFipgRAgaPAKDq9k/P25VQ4erXuk8cznuJrsSbTACg8kLE 6u+Od503dEYQxrf63PILWMc=
=jk4Z
-----END PGP SIGNATURE-----



Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/