----- Forwarded message from "Steven M. Christey" <[EMAIL PROTECTED]> -----
Date: Tue, 26 Jul 2005 15:06:02 -0400 (EDT)
From: "Steven M. Christey" <[EMAIL PROTECTED]>
To: Martin Pitt <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED]
Subject: Re: Requesting CAN for vim vulnerability [was: [Full-disclosure]
Help poor children in Uganda]
X-Spam-Status: No, score=2.0 required=4.0 tests=AWL,BAYES_95 autolearn=no
version=3.0.3
Here you go...
======================================================
Candidate: CAN-2005-2368
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2368
Reference: FULLDISC:20050725 Help poor children in Uganda
Reference:
URL:http://lists.grok.org.uk/pipermail/full-disclosure/2005-July/035402.html
Reference:
MISC:http://www.guninski.com/where_do_you_want_billg_to_go_today_5.html
vim 6.3 before 6.3.082, with modelines enabled, allows attackers to
execute arbitrary commands via shell metacharacters in the (1) glob or
(2) expand commands of a foldexpr expression for calculating fold
levels.
----- End forwarded message -----
--
Martin Pitt http://www.piware.de
Ubuntu Developer http://www.ubuntu.com
Debian Developer http://www.debian.org
signature.asc
Description: Digital signature

