CVE-2008-4677
Published Oct 22, 2008
Last updated 7 years ago
Overview
- Description
- autoload/netrw.vim (aka the Netrw Plugin) 109, 131, and other versions before 133k for Vim 7.1.266, other 7.1 versions, and 7.2 stores credentials for an FTP session, and sends those credentials when attempting to establish subsequent FTP sessions to servers on different hosts, which allows remote FTP servers to obtain sensitive information in opportunistic circumstances by logging usernames and passwords. NOTE: the upstream vendor disputes a vector involving different ports on the same host, stating "I'm assuming that they're using the same id and password on that unchanged hostname, deliberately."
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-255
Social media
- Hype score
- Not currently trending
Vendor comments
- Red HatNot vulnerable. This issue did not affect the versions of vim as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vim:vim:7.1:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A8C5B265-A7DD-4D24-864C-BF1FEEF8F138" }, { "criteria": "cpe:2.3:a:vim:vim:7.1.266:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "99E9ABC5-442C-4693-8F86-A969AD89A0C1" }, { "criteria": "cpe:2.3:a:vim:vim:7.2:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3613F5F4-9B8C-4020-8550-23310A41C85C" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vim:netrw:109:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD5B43D3-2813-4D24-A496-AEA00429117F" }, { "criteria": "cpe:2.3:a:vim:netrw:110:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2051781-F1FC-4D47-B047-439DF77679F7" }, { "criteria": "cpe:2.3:a:vim:netrw:111:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8DFB6EAD-0BEE-4FD3-823E-3B52D86603AE" }, { "criteria": "cpe:2.3:a:vim:netrw:112:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC46D98B-8655-4F84-A0C3-F29D989187D0" }, { "criteria": "cpe:2.3:a:vim:netrw:113:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11E8CE7C-5483-48EC-9BFD-FDCEF4832E99" }, { "criteria": "cpe:2.3:a:vim:netrw:114:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "618E8E68-AF47-4EBD-A1CA-C310D4C36FCA" }, { "criteria": "cpe:2.3:a:vim:netrw:115:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC4D79BA-5C46-4E9C-9611-F4405D35C0FC" }, { "criteria": "cpe:2.3:a:vim:netrw:116:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FEC552C-0A24-4A68-840A-301BA76B737A" }, { "criteria": "cpe:2.3:a:vim:netrw:118:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FEC61FD6-ED14-443D-96CA-0879BB5413BB" }, { "criteria": "cpe:2.3:a:vim:netrw:120:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8BF927C2-06B4-4123-87D5-41F08CA98AB0" }, { "criteria": "cpe:2.3:a:vim:netrw:121:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "778E1D0A-C2A7-43B7-B87E-05A1ADB8DDD9" }, { "criteria": "cpe:2.3:a:vim:netrw:122:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B94004A1-17C4-48D4-9DA0-A6A1C8F37601" }, { "criteria": "cpe:2.3:a:vim:netrw:123:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "046706FD-9A64-4FCD-BC46-0C301BA9E5B2" }, { "criteria": "cpe:2.3:a:vim:netrw:128:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DE8FDD2-EB30-4B5D-BDDD-66338A6B816B" }, { "criteria": "cpe:2.3:a:vim:netrw:131:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1910C099-42C8-45BD-B00E-FC2904E76423" } ], "operator": "OR" } ], "operator": "AND" } ]