CVE-2007-2953

Summary

CVECVE-2007-2953
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2007-07-31 10:17:00 UTC
Updated2018-10-16 16:46:00 UTC
DescriptionFormat string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the helptags command.

Risk And Classification

Problem Types: NVD-CWE-Other

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Vim Development Group Vim 7.0 All All All
Application Vim Development Group Vim 7.1 All All All
Application Vim Development Group Vim 7.1.38 All All All
Application Vim Development Group Vim 7.0 All All All
Application Vim Development Group Vim 7.1 All All All
Application Vim Development Group Vim 7.1.38 All All All
Application Vim Development Group Vim All All All All

References

ReferenceSourceLinkTags
Support REDHAT www.redhat.com
IBM X-Force Exchange XF exchange.xforce.ibmcloud.com
Webmail - OVH VUPEN www.vupen.com
SecurityFocus BUGTRAQ www.securityfocus.com
Avaya Products Vim Multiple Vulnerabilities - Secunia.com SECUNIA secunia.com
2007-0026 TRUSTIX www.trustix.org
Debian update for vim - Advisories - Secunia SECUNIA secunia.com
Repository / Oval Repository OVAL oval.cisecurity.org
Advisories | Mandriva MANDRIVA www.mandriva.com
rPath update for gvim, vim, and vim-minimal - Advisories - Secunia SECUNIA secunia.com
Red Hat update for vim - Secunia.com SECUNIA secunia.com
Repository / Oval Repository OVAL oval.cisecurity.org
Support REDHAT www.redhat.com
Security Announcement SUSE www.novell.com
Vim "helptags" Command Format String Vulnerability - Advisories - Secunia SECUNIA secunia.com Patch, Vendor Advisory
Debian -- Security Information -- DSA-1364-2 vim DEBIAN www.debian.org
Webmail : Solution de messagerie professionnelle - OVHcloud- OVH VUPEN www.vupen.com
SecurityFocus BUGTRAQ www.securityfocus.com
SUSE Updates for Multiple Packages - Advisories - Secunia SECUNIA secunia.com
ASA-2009-001 (RHSA-2008-0617) CONFIRM support.avaya.com
ftp.vim.org/pub/vim/patches/7.1/7.1.039 CONFIRM ftp.vim.org Patch
VMSA-2009-0004.2 CONFIRM www.vmware.com
Webmail : Solution de messagerie professionnelle - OVHcloud- OVH VUPEN www.vupen.com
Trustix Update for Multiple Packages - Advisories - Secunia SECUNIA secunia.com
Vim "helptags" Command Format String Vulnerability - Secunia Research - Secunia MISC secunia.com Patch, Vendor Advisory
USN-505-1: vim vulnerability | Ubuntu UBUNTU www.ubuntu.com
Mandriva update for vim - Advisories - Secunia SECUNIA secunia.com
Ubuntu update for vim - Advisories - Secunia SECUNIA secunia.com
[VIM] vim editor duplicates / clarifications VIM www.attrition.org
Vim HelpTags Command Remote Format String Vulnerability BID www.securityfocus.com Patch
Support / Security / Advisories / / MDVSA-2008:236 | Mandriva MANDRIVA www.mandriva.com
issues.rpath.com/browse/RPL-1595 CONFIRM issues.rpath.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Vendor Comments And Credit

OrganizationPublishedContributorStatement
Red Hat2007-08-06Joshua BressersRed Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248542 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report