Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades.
http://www.openwall.com/lists/oss-security/2008/07/15/4 http://www.vuxml.org/freebsd/f866d2af-bbba-11df-8a8d-0008743bf21a.html
Insight
The following packages are affected:
vim6
vim6+ruby
CVE-2008-3432
Heap-based buffer overflow in the mch_expand_wildcards function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames, as demonstrated by the netrw.v3 test case.
Severity
Classification
-
CVE CVE-2008-3432 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities