{"api_version":"1","generated_at":"2026-04-23T09:50:56+00:00","cve":"CVE-2007-2953","urls":{"html":"https://cve.report/CVE-2007-2953","api":"https://cve.report/api/cve/CVE-2007-2953.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2007-2953","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2007-2953"},"summary":{"title":"CVE-2007-2953","description":"Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the helptags command.","state":"PUBLISHED","assigner":"flexera","published_at":"2007-07-31 10:17:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"6.8","severity":"","vector":"AV:N/AC:M/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://secunia.com/advisories/32858","name":"http://secunia.com/advisories/32858","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Red Hat update for vim - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.trustix.org/errata/2007/0026/","name":"http://www.trustix.org/errata/2007/0026/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"text/plain","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/secunia_research/2007-66/advisory/","name":"http://secunia.com/secunia_research/2007-66/advisory/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Vim \"helptags\" Command Format String Vulnerability - Secunia Research - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vmware.com/security/advisories/VMSA-2009-0004.html","name":"http://www.vmware.com/security/advisories/VMSA-2009-0004.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"VMSA-2009-0004.2","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2009/0033","name":"http://www.vupen.com/english/advisories/2009/0033","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2007/2687","name":"http://www.vupen.com/english/advisories/2007/2687","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35655","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35655","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2008-0580.html","name":"http://www.redhat.com/support/errata/RHSA-2008-0580.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2007/dsa-1364","name":"http://www.debian.org/security/2007/dsa-1364","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Debian -- Security Information -- DSA-1364-2 vim","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/502322/100/0/threaded","name":"http://www.securityfocus.com/archive/1/502322/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.attrition.org/pipermail/vim/2007-August/001770.html","name":"http://www.attrition.org/pipermail/vim/2007-August/001770.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[VIM] vim editor duplicates / clarifications","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:236","name":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:236","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Support / Security / Advisories /  / MDVSA-2008:236 | Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/25095","name":"http://www.securityfocus.com/bid/25095","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"Vim HelpTags Command Remote Format String Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://secunia.com/advisories/26822","name":"http://secunia.com/advisories/26822","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Trustix Update for Multiple Packages - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm","name":"http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"ASA-2009-001 (RHSA-2008-0617)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/475076/100/100/threaded","name":"http://www.securityfocus.com/archive/1/475076/100/100/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/26594","name":"http://secunia.com/advisories/26594","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Ubuntu update for vim - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.novell.com/linux/security/advisories/2007_18_sr.html","name":"http://www.novell.com/linux/security/advisories/2007_18_sr.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Security Announcement","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"https://issues.rpath.com/browse/RPL-1595","name":"https://issues.rpath.com/browse/RPL-1595","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"ftp://ftp.vim.org/pub/vim/patches/7.1/7.1.039","name":"ftp://ftp.vim.org/pub/vim/patches/7.1/7.1.039","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/26674","name":"http://secunia.com/advisories/26674","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SUSE Updates for Multiple Packages - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2009/0904","name":"http://www.vupen.com/english/advisories/2009/0904","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:168","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:168","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Advisories | Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/25941","name":"http://secunia.com/advisories/25941","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Vim \"helptags\" Command Format String Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/26653","name":"http://secunia.com/advisories/26653","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Debian update for vim - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6463","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6463","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/usn-505-1","name":"http://www.ubuntu.com/usn/usn-505-1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"USN-505-1: vim vulnerability | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/26285","name":"http://secunia.com/advisories/26285","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"rPath update for gvim, vim, and vim-minimal - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11549","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11549","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/33410","name":"http://secunia.com/advisories/33410","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Avaya Products Vim Multiple Vulnerabilities - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/26522","name":"http://secunia.com/advisories/26522","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Mandriva update for vim - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2008-0617.html","name":"http://www.redhat.com/support/errata/RHSA-2008-0617.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2007-2953","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2953","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2007","cve_id":"2953","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"vim_development_group","cpe5":"vim","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2953","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"vim_development_group","cpe5":"vim","cpe6":"7.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2953","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"vim_development_group","cpe5":"vim","cpe6":"7.1.38","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2953","vulnerable":"1","versionEndIncluding":"6.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"vim_development_group","cpe5":"vim","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[{"cvename":"CVE-2007-2953","organization":"Red Hat","lastmodified":"2007-08-06","contributor":"Joshua Bressers","statementText":"Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248542 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/","cve_year":"2007","cve_id":"2953","crc32":"103071b4"}],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T13:57:54.700Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.vmware.com/security/advisories/VMSA-2009-0004.html"},{"name":"25095","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/25095"},{"name":"26822","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26822"},{"name":"MDKSA-2007:168","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:168"},{"name":"26522","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26522"},{"name":"26285","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26285"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://issues.rpath.com/browse/RPL-1595"},{"name":"26594","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26594"},{"name":"25941","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25941"},{"name":"32858","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/32858"},{"name":"33410","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/33410"},{"name":"USN-505-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/usn-505-1"},{"name":"RHSA-2008:0580","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2008-0580.html"},{"name":"20070730 FLEA-2007-0036-1 vim vim-minimal gvim","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/475076/100/100/threaded"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm"},{"name":"ADV-2007-2687","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/2687"},{"name":"ADV-2009-0904","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2009/0904"},{"name":"ADV-2009-0033","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2009/0033"},{"name":"20090401 VMSA-2009-0004 ESX Service Console updates for openssl, bind, and vim","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/502322/100/0/threaded"},{"name":"oval:org.mitre.oval:def:6463","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6463"},{"name":"2007-0026","tags":["vendor-advisory","x_refsource_TRUSTIX","x_transferred"],"url":"http://www.trustix.org/errata/2007/0026/"},{"name":"DSA-1364","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2007/dsa-1364"},{"name":"SUSE-SR:2007:018","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2007_18_sr.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2007-66/advisory/"},{"name":"26653","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26653"},{"name":"20070823 vim editor duplicates / clarifications","tags":["mailing-list","x_refsource_VIM","x_transferred"],"url":"http://www.attrition.org/pipermail/vim/2007-August/001770.html"},{"name":"oval:org.mitre.oval:def:11549","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11549"},{"name":"vim-helptagsone-code-execution(35655)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35655"},{"name":"MDVSA-2008:236","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:236"},{"name":"26674","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26674"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"ftp://ftp.vim.org/pub/vim/patches/7.1/7.1.039"},{"name":"RHSA-2008:0617","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2008-0617.html"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2007-07-27T00:00:00.000Z","descriptions":[{"lang":"en","value":"Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the helptags command."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-16T14:57:01.000Z","orgId":"44d08088-2bea-4760-83a6-1e9be26b15ab","shortName":"flexera"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"http://www.vmware.com/security/advisories/VMSA-2009-0004.html"},{"name":"25095","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/25095"},{"name":"26822","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26822"},{"name":"MDKSA-2007:168","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:168"},{"name":"26522","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26522"},{"name":"26285","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26285"},{"tags":["x_refsource_CONFIRM"],"url":"https://issues.rpath.com/browse/RPL-1595"},{"name":"26594","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26594"},{"name":"25941","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25941"},{"name":"32858","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/32858"},{"name":"33410","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/33410"},{"name":"USN-505-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/usn-505-1"},{"name":"RHSA-2008:0580","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2008-0580.html"},{"name":"20070730 FLEA-2007-0036-1 vim vim-minimal gvim","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/475076/100/100/threaded"},{"tags":["x_refsource_CONFIRM"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm"},{"name":"ADV-2007-2687","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/2687"},{"name":"ADV-2009-0904","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2009/0904"},{"name":"ADV-2009-0033","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2009/0033"},{"name":"20090401 VMSA-2009-0004 ESX Service Console updates for openssl, bind, and vim","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/502322/100/0/threaded"},{"name":"oval:org.mitre.oval:def:6463","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6463"},{"name":"2007-0026","tags":["vendor-advisory","x_refsource_TRUSTIX"],"url":"http://www.trustix.org/errata/2007/0026/"},{"name":"DSA-1364","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2007/dsa-1364"},{"name":"SUSE-SR:2007:018","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/2007_18_sr.html"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2007-66/advisory/"},{"name":"26653","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26653"},{"name":"20070823 vim editor duplicates / clarifications","tags":["mailing-list","x_refsource_VIM"],"url":"http://www.attrition.org/pipermail/vim/2007-August/001770.html"},{"name":"oval:org.mitre.oval:def:11549","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11549"},{"name":"vim-helptagsone-code-execution(35655)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35655"},{"name":"MDVSA-2008:236","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:236"},{"name":"26674","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26674"},{"tags":["x_refsource_CONFIRM"],"url":"ftp://ftp.vim.org/pub/vim/patches/7.1/7.1.039"},{"name":"RHSA-2008:0617","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2008-0617.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"PSIRT-CNA@flexerasoftware.com","ID":"CVE-2007-2953","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the helptags command."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://www.vmware.com/security/advisories/VMSA-2009-0004.html","refsource":"CONFIRM","url":"http://www.vmware.com/security/advisories/VMSA-2009-0004.html"},{"name":"25095","refsource":"BID","url":"http://www.securityfocus.com/bid/25095"},{"name":"26822","refsource":"SECUNIA","url":"http://secunia.com/advisories/26822"},{"name":"MDKSA-2007:168","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:168"},{"name":"26522","refsource":"SECUNIA","url":"http://secunia.com/advisories/26522"},{"name":"26285","refsource":"SECUNIA","url":"http://secunia.com/advisories/26285"},{"name":"https://issues.rpath.com/browse/RPL-1595","refsource":"CONFIRM","url":"https://issues.rpath.com/browse/RPL-1595"},{"name":"26594","refsource":"SECUNIA","url":"http://secunia.com/advisories/26594"},{"name":"25941","refsource":"SECUNIA","url":"http://secunia.com/advisories/25941"},{"name":"32858","refsource":"SECUNIA","url":"http://secunia.com/advisories/32858"},{"name":"33410","refsource":"SECUNIA","url":"http://secunia.com/advisories/33410"},{"name":"USN-505-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/usn-505-1"},{"name":"RHSA-2008:0580","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2008-0580.html"},{"name":"20070730 FLEA-2007-0036-1 vim vim-minimal gvim","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/475076/100/100/threaded"},{"name":"http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm","refsource":"CONFIRM","url":"http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm"},{"name":"ADV-2007-2687","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/2687"},{"name":"ADV-2009-0904","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2009/0904"},{"name":"ADV-2009-0033","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2009/0033"},{"name":"20090401 VMSA-2009-0004 ESX Service Console updates for openssl, bind, and vim","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/502322/100/0/threaded"},{"name":"oval:org.mitre.oval:def:6463","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6463"},{"name":"2007-0026","refsource":"TRUSTIX","url":"http://www.trustix.org/errata/2007/0026/"},{"name":"DSA-1364","refsource":"DEBIAN","url":"http://www.debian.org/security/2007/dsa-1364"},{"name":"SUSE-SR:2007:018","refsource":"SUSE","url":"http://www.novell.com/linux/security/advisories/2007_18_sr.html"},{"name":"http://secunia.com/secunia_research/2007-66/advisory/","refsource":"MISC","url":"http://secunia.com/secunia_research/2007-66/advisory/"},{"name":"26653","refsource":"SECUNIA","url":"http://secunia.com/advisories/26653"},{"name":"20070823 vim editor duplicates / clarifications","refsource":"VIM","url":"http://www.attrition.org/pipermail/vim/2007-August/001770.html"},{"name":"oval:org.mitre.oval:def:11549","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11549"},{"name":"vim-helptagsone-code-execution(35655)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35655"},{"name":"MDVSA-2008:236","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:236"},{"name":"26674","refsource":"SECUNIA","url":"http://secunia.com/advisories/26674"},{"name":"ftp://ftp.vim.org/pub/vim/patches/7.1/7.1.039","refsource":"CONFIRM","url":"ftp://ftp.vim.org/pub/vim/patches/7.1/7.1.039"},{"name":"RHSA-2008:0617","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2008-0617.html"}]}}}},"cveMetadata":{"assignerOrgId":"44d08088-2bea-4760-83a6-1e9be26b15ab","assignerShortName":"flexera","cveId":"CVE-2007-2953","datePublished":"2007-07-31T10:00:00.000Z","dateReserved":"2007-05-31T00:00:00.000Z","dateUpdated":"2024-08-07T13:57:54.700Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2007-07-31 10:17:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vim_development_group:vim:*:*:*:*:*:*:*:*","versionEndIncluding":"6.4","matchCriteriaId":"E4F93B06-3F84-4C05-9C2C-E5BC29990796"},{"vulnerable":true,"criteria":"cpe:2.3:a:vim_development_group:vim:7.0:*:*:*:*:*:*:*","matchCriteriaId":"4A9EFB35-7AFD-4306-BC1C-EB5C984F4B3C"},{"vulnerable":true,"criteria":"cpe:2.3:a:vim_development_group:vim:7.1:*:*:*:*:*:*:*","matchCriteriaId":"9BCF512E-8CAC-4001-B91C-E61569E0ED25"},{"vulnerable":true,"criteria":"cpe:2.3:a:vim_development_group:vim:7.1.38:*:*:*:*:*:*:*","matchCriteriaId":"2598FB8B-1D83-42E8-8B3C-C042150F8AF4"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2007","CveId":"2953","Ordinal":"1","Title":"CVE-2007-2953","CVE":"CVE-2007-2953","Year":"2007"},"notes":[{"CveYear":"2007","CveId":"2953","Ordinal":"1","NoteData":"Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the helptags command.","Type":"Description","Title":"CVE-2007-2953"},{"CveYear":"2007","CveId":"2953","Ordinal":"2","NoteData":"2007-07-31","Type":"Other","Title":"Published"},{"CveYear":"2007","CveId":"2953","Ordinal":"3","NoteData":"2018-10-16","Type":"Other","Title":"Modified"}]}}}