Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Titlevim regression update
Informations
NameDSA-4467First vendor Publication2019-06-18
VendorDebianLast vendor Modification2019-06-23
Severity (Vendor) N/ARevision2

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score9.3Attack RangeNetwork
Cvss Impact Score10Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

The update for vim released as DSA 4467-1 introduced a regression which broke syntax highlighting in some circumstances. Updated vim packages are now available to correct this issue.

For the stable distribution (stretch), this problem has been fixed in version 8.0.0197-4+deb9u3.

We recommend that you upgrade your vim packages.

For the detailed security status of vim please refer to its security tracker page at: https://security-tracker.debian.org/tracker/vim

Original Source

Url : http://www.debian.org/security/2019/dsa-4467

CWE : Common Weakness Enumeration

%idName
100 %CWE-78Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application6953

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2019-06-24 00:18:24
  • Multiple Updates
2019-06-19 00:18:50
  • First insertion