--------------------------------------------------------------------- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated vim packages fix modeline vulnerability Advisory ID: RHSA-2002:297-17 Issue date: 2003-01-16 Updated on: 2003-01-15 Product: Red Hat Linux Keywords: vim modeline security Cross references: Obsoletes: RHEA-2002:017 CVE Names: CAN-2002-1377 --------------------------------------------------------------------- 1. Topic: Updated vim packages are now available for Red Hat Linux. These updates resolve a security issue when opening a specially crafted text file. 2. Relevant releases/architectures: Red Hat Linux 6.2 - i386 Red Hat Linux 7.0 - i386 Red Hat Linux 7.1 - i386 Red Hat Linux 7.2 - i386, ia64 Red Hat Linux 7.3 - i386 Red Hat Linux 8.0 - i386 3. Problem description: VIM (Vi IMproved) is a version of the vi editor. VIM allows a user to set the modeline differently for each edited text file by placing special comments in the files. Georgi Guninski found that these comments can be carefully crafted in order to call external programs. This could allow an attacker to create a text file such that when it is opened arbitrary commands are executed. Users of VIM are advised to upgrade to these errata packages which have been patched to disable the usage of dangerous functions in modelines. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. RPMs required: Red Hat Linux 6.2: SRPMS: ftp://updates.redhat.com/6.2/en/os/SRPMS/vim-6.1-18.6x.3.src.rpm i386: ftp://updates.redhat.com/6.2/en/os/i386/vim-common-6.1-18.6x.3.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/vim-minimal-6.1-18.6x.3.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/vim-enhanced-6.1-18.6x.3.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/vim-X11-6.1-18.6x.3.i386.rpm Red Hat Linux 7.0: SRPMS: ftp://updates.redhat.com/7.0/en/os/SRPMS/vim-6.1-18.7x.2.src.rpm i386: ftp://updates.redhat.com/7.0/en/os/i386/vim-common-6.1-18.7x.2.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/vim-minimal-6.1-18.7x.2.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/vim-enhanced-6.1-18.7x.2.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/vim-X11-6.1-18.7x.2.i386.rpm Red Hat Linux 7.1: SRPMS: ftp://updates.redhat.com/7.1/en/os/SRPMS/vim-6.1-18.7x.2.src.rpm i386: ftp://updates.redhat.com/7.1/en/os/i386/vim-common-6.1-18.7x.2.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/vim-minimal-6.1-18.7x.2.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/vim-enhanced-6.1-18.7x.2.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/vim-X11-6.1-18.7x.2.i386.rpm Red Hat Linux 7.2: SRPMS: ftp://updates.redhat.com/7.2/en/os/SRPMS/vim-6.1-18.7x.2.src.rpm i386: ftp://updates.redhat.com/7.2/en/os/i386/vim-common-6.1-18.7x.2.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/vim-minimal-6.1-18.7x.2.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/vim-enhanced-6.1-18.7x.2.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/vim-X11-6.1-18.7x.2.i386.rpm ia64: ftp://updates.redhat.com/7.2/en/os/ia64/vim-common-6.1-18.7x.2.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/vim-minimal-6.1-18.7x.2.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/vim-enhanced-6.1-18.7x.2.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/vim-X11-6.1-18.7x.2.ia64.rpm Red Hat Linux 7.3: SRPMS: ftp://updates.redhat.com/7.3/en/os/SRPMS/vim-6.1-18.7x.2.src.rpm i386: ftp://updates.redhat.com/7.3/en/os/i386/vim-common-6.1-18.7x.2.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/vim-minimal-6.1-18.7x.2.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/vim-enhanced-6.1-18.7x.2.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/vim-X11-6.1-18.7x.2.i386.rpm Red Hat Linux 8.0: SRPMS: ftp://updates.redhat.com/8.0/en/os/SRPMS/vim-6.1-18.8x.1.src.rpm i386: ftp://updates.redhat.com/8.0/en/os/i386/vim-common-6.1-18.8x.1.i386.rpm ftp://updates.redhat.com/8.0/en/os/i386/vim-minimal-6.1-18.8x.1.i386.rpm ftp://updates.redhat.com/8.0/en/os/i386/vim-enhanced-6.1-18.8x.1.i386.rpm ftp://updates.redhat.com/8.0/en/os/i386/vim-X11-6.1-18.8x.1.i386.rpm 6. Verification: MD5 sum Package Name -------------------------------------------------------------------------- e9f881277e228d8fa236a62a4708c4cc 6.2/en/os/SRPMS/vim-6.1-18.6x.3.src.rpm 0e1ab8d86a448125d0d7ca46d4d03ce9 6.2/en/os/i386/vim-X11-6.1-18.6x.3.i386.rpm f591194bc8b067e9b17c128f41438c9c 6.2/en/os/i386/vim-common-6.1-18.6x.3.i386.rpm 2ffa90ad19b84cea780fbf97ba7f041e 6.2/en/os/i386/vim-enhanced-6.1-18.6x.3.i386.rpm cb3efa24eb8918f84d01102389e46c75 6.2/en/os/i386/vim-minimal-6.1-18.6x.3.i386.rpm 4577eb89b6c01717928cbbba1e8e8d1f 7.0/en/os/SRPMS/vim-6.1-18.7x.2.src.rpm 1ec98d3dae05d1b054130e39763ea992 7.0/en/os/i386/vim-X11-6.1-18.7x.2.i386.rpm 90ec6d2b9129dfce14b7cec28b01a155 7.0/en/os/i386/vim-common-6.1-18.7x.2.i386.rpm 732a4a8c7e45a24dab4713582ecdd197 7.0/en/os/i386/vim-enhanced-6.1-18.7x.2.i386.rpm e310b4b5a4fc1fc17d6e7389b0093c44 7.0/en/os/i386/vim-minimal-6.1-18.7x.2.i386.rpm 4577eb89b6c01717928cbbba1e8e8d1f 7.1/en/os/SRPMS/vim-6.1-18.7x.2.src.rpm 1ec98d3dae05d1b054130e39763ea992 7.1/en/os/i386/vim-X11-6.1-18.7x.2.i386.rpm 90ec6d2b9129dfce14b7cec28b01a155 7.1/en/os/i386/vim-common-6.1-18.7x.2.i386.rpm 732a4a8c7e45a24dab4713582ecdd197 7.1/en/os/i386/vim-enhanced-6.1-18.7x.2.i386.rpm e310b4b5a4fc1fc17d6e7389b0093c44 7.1/en/os/i386/vim-minimal-6.1-18.7x.2.i386.rpm 4577eb89b6c01717928cbbba1e8e8d1f 7.2/en/os/SRPMS/vim-6.1-18.7x.2.src.rpm 1ec98d3dae05d1b054130e39763ea992 7.2/en/os/i386/vim-X11-6.1-18.7x.2.i386.rpm 90ec6d2b9129dfce14b7cec28b01a155 7.2/en/os/i386/vim-common-6.1-18.7x.2.i386.rpm 732a4a8c7e45a24dab4713582ecdd197 7.2/en/os/i386/vim-enhanced-6.1-18.7x.2.i386.rpm e310b4b5a4fc1fc17d6e7389b0093c44 7.2/en/os/i386/vim-minimal-6.1-18.7x.2.i386.rpm b0f8f9b715b76081f9eb6cfa8be4d66b 7.2/en/os/ia64/vim-X11-6.1-18.7x.2.ia64.rpm dde9fb8c41834ed2851e625baf8021fe 7.2/en/os/ia64/vim-common-6.1-18.7x.2.ia64.rpm 7d99e5d8c7acbee0e76c46d094a7c8a7 7.2/en/os/ia64/vim-enhanced-6.1-18.7x.2.ia64.rpm 2fe4f373692275e58f692c89f04bacaa 7.2/en/os/ia64/vim-minimal-6.1-18.7x.2.ia64.rpm 4577eb89b6c01717928cbbba1e8e8d1f 7.3/en/os/SRPMS/vim-6.1-18.7x.2.src.rpm 1ec98d3dae05d1b054130e39763ea992 7.3/en/os/i386/vim-X11-6.1-18.7x.2.i386.rpm 90ec6d2b9129dfce14b7cec28b01a155 7.3/en/os/i386/vim-common-6.1-18.7x.2.i386.rpm 732a4a8c7e45a24dab4713582ecdd197 7.3/en/os/i386/vim-enhanced-6.1-18.7x.2.i386.rpm e310b4b5a4fc1fc17d6e7389b0093c44 7.3/en/os/i386/vim-minimal-6.1-18.7x.2.i386.rpm 7662f8b82c03dc12af971abc7eec166c 8.0/en/os/SRPMS/vim-6.1-18.8x.1.src.rpm 0b19e93621c1a3bc34d8cbff32409c5b 8.0/en/os/i386/vim-X11-6.1-18.8x.1.i386.rpm 290188637a0f61a80e39954c9e8f3850 8.0/en/os/i386/vim-common-6.1-18.8x.1.i386.rpm 48a8bdfe8a6460c2f0498275f813dc97 8.0/en/os/i386/vim-enhanced-6.1-18.8x.1.i386.rpm da89d37820bc1441f51310ca93edf62a 8.0/en/os/i386/vim-minimal-6.1-18.8x.1.i386.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at http://www.redhat.com/about/contact/pgpkey.html You can verify each package with the following command: rpm --checksig -v <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: md5sum <filename> 7. References: http://www.guninski.com/vim1.html http://marc.theaimsgroup.com/?l=full-disclosure&m=103972417823566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1377 8. Contact: The Red Hat security contact is <security@redhat.com>. More contact details at http://www.redhat.com/solutions/security/news/contact.html Copyright 2003 Red Hat, Inc. _______________________________________________ Redhat-watch-list mailing list To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list