fkie_cve-2008-4677
Vulnerability from fkie_nvd
Published
2008-10-22 18:00
Modified
2025-04-09 00:30
Severity ?
Summary
autoload/netrw.vim (aka the Netrw Plugin) 109, 131, and other versions before 133k for Vim 7.1.266, other 7.1 versions, and 7.2 stores credentials for an FTP session, and sends those credentials when attempting to establish subsequent FTP sessions to servers on different hosts, which allows remote FTP servers to obtain sensitive information in opportunistic circumstances by logging usernames and passwords. NOTE: the upstream vendor disputes a vector involving different ports on the same host, stating "I'm assuming that they're using the same id and password on that unchanged hostname, deliberately."
References
cve@mitre.orghttp://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
cve@mitre.orghttp://secunia.com/advisories/31464Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/34418
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2008:236
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2008/10/06/4
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2008/10/16/2
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2008/10/20/2
cve@mitre.orghttp://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/495432
cve@mitre.orghttp://www.securityfocus.com/archive/1/495436
cve@mitre.orghttp://www.securityfocus.com/bid/30670
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2379
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=461750
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/44419
af854a3a-2127-422b-91ae-364da2661108http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31464Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34418
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/10/06/4
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/10/16/2
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/10/20/2
af854a3a-2127-422b-91ae-364da2661108http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/495432
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/495436
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/30670
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2379
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=461750
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/44419
Impacted products
Vendor Product Version
vim vim 7.1
vim vim 7.1.266
vim vim 7.2
vim netrw 109
vim netrw 110
vim netrw 111
vim netrw 112
vim netrw 113
vim netrw 114
vim netrw 115
vim netrw 116
vim netrw 118
vim netrw 120
vim netrw 121
vim netrw 122
vim netrw 123
vim netrw 128
vim netrw 131



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:vim:vim:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8C5B265-A7DD-4D24-864C-BF1FEEF8F138",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:vim:vim:7.1.266:*:*:*:*:*:*:*",
              "matchCriteriaId": "99E9ABC5-442C-4693-8F86-A969AD89A0C1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:vim:vim:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3613F5F4-9B8C-4020-8550-23310A41C85C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:vim:netrw:109:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD5B43D3-2813-4D24-A496-AEA00429117F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vim:netrw:110:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2051781-F1FC-4D47-B047-439DF77679F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vim:netrw:111:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DFB6EAD-0BEE-4FD3-823E-3B52D86603AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vim:netrw:112:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC46D98B-8655-4F84-A0C3-F29D989187D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vim:netrw:113:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E8CE7C-5483-48EC-9BFD-FDCEF4832E99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vim:netrw:114:*:*:*:*:*:*:*",
              "matchCriteriaId": "618E8E68-AF47-4EBD-A1CA-C310D4C36FCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vim:netrw:115:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC4D79BA-5C46-4E9C-9611-F4405D35C0FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vim:netrw:116:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FEC552C-0A24-4A68-840A-301BA76B737A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vim:netrw:118:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEC61FD6-ED14-443D-96CA-0879BB5413BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vim:netrw:120:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BF927C2-06B4-4123-87D5-41F08CA98AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vim:netrw:121:*:*:*:*:*:*:*",
              "matchCriteriaId": "778E1D0A-C2A7-43B7-B87E-05A1ADB8DDD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vim:netrw:122:*:*:*:*:*:*:*",
              "matchCriteriaId": "B94004A1-17C4-48D4-9DA0-A6A1C8F37601",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vim:netrw:123:*:*:*:*:*:*:*",
              "matchCriteriaId": "046706FD-9A64-4FCD-BC46-0C301BA9E5B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vim:netrw:128:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DE8FDD2-EB30-4B5D-BDDD-66338A6B816B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vim:netrw:131:*:*:*:*:*:*:*",
              "matchCriteriaId": "1910C099-42C8-45BD-B00E-FC2904E76423",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "autoload/netrw.vim (aka the Netrw Plugin) 109, 131, and other versions before 133k for Vim 7.1.266, other 7.1 versions, and 7.2 stores credentials for an FTP session, and sends those credentials when attempting to establish subsequent FTP sessions to servers on different hosts, which allows remote FTP servers to obtain sensitive information in opportunistic circumstances by logging usernames and passwords.  NOTE: the upstream vendor disputes a vector involving different ports on the same host, stating \"I\u0027m assuming that they\u0027re using the same id and password on that unchanged hostname, deliberately.\""
    },
    {
      "lang": "es",
      "value": "autoload/netrw.vim (tambi\u00e9n conocido como  Netrw Plugin) v109, v131, y versiones anteriores a v133k para Vim v7.1.266, otras versiones v7.1 , y v7.2, guardan las credenciales de las sesiones FTP y env\u00edan estos datos al intentar establecer sesiones FTP posteriores a los servidores en diferentes host, lo que permite a los servidores FTP obtener informaci\u00f3n sensible en circunstancias oportunas mediante la validaci\u00f3n con nombres de usuario y contrase\u00f1as. NOTA: el fabricante cuestiona un vector involucrando a distintos puertos en un mismo host afirmando que \"Asumimos que est\u00e1n usando el mismo id y contrase\u00f1a sobre el mismo servidor de manera intencionada\"."
    }
  ],
  "id": "CVE-2008-4677",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-10-22T18:00:00.910",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31464"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34418"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:236"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2008/10/06/4"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2008/10/16/2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2008/10/20/2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/495432"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/495436"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/30670"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/2379"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=461750"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44419"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31464"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34418"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:236"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2008/10/06/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2008/10/16/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2008/10/20/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/495432"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/495436"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/30670"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2379"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=461750"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44419"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Not vulnerable. This issue did not affect the versions of vim as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.",
      "lastModified": "2008-10-25T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-255"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…