Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <6edf76c20807210457i1254aab6q333c223c01f2ce17@mail.gmail.com>
Date: Mon, 21 Jul 2008 12:57:48 +0100
From: "Jan Minář" <rdancer@...ncer.org>
To: "Jonathan Smith" <smithj@...ethemallocs.com>
Cc: "Tomas Hoger" <thoger@...hat.com>, oss-security@...ts.openwall.com, 
	coley@...us.mitre.org, "Bram Moolenaar" <Bram@...lenaar.net>, 
	"Charles E Campbell, Jr" <drchip@...pbellfamily.biz>
Subject: Re: Re: More arbitrary code executions in Netrw version 125, Vim 7.2a.10

On Sun, Jul 20, 2008 at 8:12 PM, Jonathan Smith
<smithj@...ethemallocs.com> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> Sorry it took so long to get back; I've been rather busy lately.
>
> Tomas Hoger wrote:
>> Jonathan, did new netrw tests work for you?  With which vim version?
>> They all failed for me with vim 7.1.245 / netrw 109.
>
> No vulnerability was found for me for vim 7.1.213 with netrw 109, as
> compiled for rPath Linux.

Version 109 is probably too old.  There has been a lot of
functionality added since, and I presume a lot of refactoring done
too.  According to the [0]Netrw version history, marking files (used
by netrw.v2 & netrw.v3) was introduced in version 111.

On the other hand, these vulnerabilities should not depend on the Vim
version; the TIOCSTI method used in netrw.v4 ``test'' target may not
be very portable outside Un*x though.

[0] http://www.vim.org/scripts/script.php?script_id=1075

Hope that helps.

Jan.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.