On 22/08/08 13:37, Jan Minář wrote:
> Hi!
>
> Thanks again to Ben for reporting this.
>
> It's not just the K command.  The<C-]>  and g] commands are vulnerable
> too.  Patch attached.
>
> Attack vectors:
>
>      (1) K -- arbitrary shell command execution via additional shell
>          commands (insufficient sanitization of a shell command string)
>          (the original vulnerability)
>
>      (2) K -- arbitrary shell command execution via man(1) command line
>          switches (such as ``--pager'' in GNU man -- cf. manpage)
>
>      (3)<C-]>, g] -- arbitrary Vim Script command execution via additional
>          Ex statements (insufficient escaping of an argument)
>
>      (4) Unknown vulnerabilities stemming from using unknown shell, and,
>          by extension, an unknown man command
>
> This patch solves (1) and (3), and partially solves (2).  Unfortunately,
> the fix for (2) is a hardcoded double-dash (--) inserted between the
> program name and the command line arguments.  This will break for man
> commands that do not understand double-dash.  A more clever solution is
> needed.
>
> The discussion of (the feasibility of) a fix for (4) has been going on
> for some time.  All proposed solutions seem to have irreconcilable
> downsides.
>
> Cheers,
> Jan.

Maybe you should set a config-time option (or create one) to avoid any 
interaction with the shell?

Even better: If you don't want ever to become the victim of any exploit, 
turn your computer off at the wall switch and leave it off.

:-b

Regards,
Tony.
-- 
Bore, n.:
        A person who talks when you wish him to listen.
                -- Ambrose Bierce, "The Devil's Dictionary"

--~--~---------~--~----~------------~-------~--~----~
You received this message from the "vim_dev" maillist.
For more information, visit http://www.vim.org/maillist.php
-~----------~----~----~----~------~----~------~--~---

Raspunde prin e-mail lui