[LWN Logo]
[LWN.net]
From:	 TurboLinux Security Team <security@www1.turbolinux.com>
To:	 tl-security-announce@www1.turbolinux.com
Subject: [TL-Security-Announce] TLSA2001025 vim-5.7-4
Date:	 Fri, 25 May 2001 15:40:15 -0700 (PDT)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



_____________________________________________________________________________________________

                     Turbolinux Security Announcement

        Package:  vim
        Vulnerable Packages: All Turbolinux versions previous to 5.7-4
        Date: 05/23/2001 5:00 PDT


        Affected Turbolinux versions: TL Server 6.5,
                                      TL Workstation 6.1,
                                      TL Server 6.0.5 and earlier
                                      
        Turbolinux Advisory ID#:  TLSA2001025

        Credits: First reported by Red Hat:  RHSA-2001:008-02

References:  http://www.securityfocus.com/frames/?content=/vdb/bottom.html%3Fvid%3D2510

_____________________________________________________________________________________________

A security hole has been fixed in the package vim.  Please update the packages in your 
installation as soon as possible.
_____________________________________________________________________________________________

1. Problem Summary

   An attacker can create a text file embedded with potentially dangerous commands.  By
   opening this text file in VIM, the commands are executed with the privileges of the user
   that opens the file.  Hence, potential damage to a system can occur if a user were to
   open this file as root.  

   For this vulnerability to be exploited, the ability to modify status lines has to be
   activated.  This is done by adjusting the setting of the parameter "stl" or "statusline"
   in a file called ".vimrc".  

2. Solution
     
   Update the packages from our ftp server by running the following
   command:

   rpm -Uvh ftp_path_to_filename

   Where ftp_path_to_filename is the following:

ftp://ftp.turbolinux.com/pub/updates/6.0/security/vim-X11-5.7-4.i386.rpm
ftp://ftp.turbolinux.com/pub/updates/6.0/security/vim-common-5.7-4.i386.rpm 
ftp://ftp.turbolinux.com/pub/updates/6.0/security/vim-standard-5.7-4.i386.rpm

   The source RPM can be downloaded here:

ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/vim-5.7-4.src.rpm


  **Note: You must rebuild and install the RPM if you choose to download
  and install the SRPM.  Simply installing the SRPM alone WILL NOT CLOSE
  THE SECURITY HOLE.

          To rebuild the vim packages on Turbolinux Workstation 6.1,
   you must have the package "ctags" installed.  To rebuild the package
   on Turbolinux Server versions 6.0.5 and earlier, make sure you install
   XFree86-devel, gtk+-devel, python-devel, gdbm-devel, and ncurses-devel.

 Please verify the MD5 checksums of the updates before you install:

  MD5 sum                               Package Name
_____________________________________________________________________________________________
                                       
  a97f5d3d5099fa20d742ff0ffac65526      vim-X11-5.7-4.i386.rpm
  7dda4a9746fcfbc16200ecfa0845362f      vim-common-5.7-4.i386.rpm
  419516258c4f6637c504a0ccb9a73ab0      vim-standard-5.7-4.i386.rpm
  51d1ae3a139e53a85b464f2ec25f0c5b      vim-5.7-4.src.rpm                                     
_____________________________________________________________________________________________

These packages are GPG signed by Turbolinux for security. Our key
is available here:

 http://www.turbolinux.com/security/tlgpgkey.asc

To verify a package, use the following command:

 rpm --checksig name_of_rpm

To examine only the md5sum, use the following command:

 md5sum name_of_rpm

**Note: Checking GPG keys requires RPM 3.0 or higher.

________________________________________________________________________________________________

You can find more updates on our ftp server:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/ 

for TL6.x Workstation and Server security updates

Our webpage for security announcements:

   http://www.turbolinux.com/security

If you want to report vulnerabilities, please contact:

   security@turbolinux.com
________________________________________________________________________________________________

Subscribe to the Turbolinux Security Mailing lists:

  TL-security - A moderated list for discussing security issues
                Turbolinux products.
  Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security

  TL-security-announce - An announce-only mailing list for security
                         updates and alerts.

  Subscribe at:

      http://www.turbolinux.com/mailman/listinfo/tl-security-announce
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: pgpenvelope 2.10.0 - http://pgpenvelope.sourceforge.net/

iD8DBQE7Dt9dcpw52/ZatwoRAmn/AJ4gurySy/8/uwsYc2H4ff9OFX0DGQCfXJ+Y
jt0q5OhchTg5NzaI6icm7vo=
=ro+h
-----END PGP SIGNATURE-----



_______________________________________________
TL-Security-Announce mailing list
TL-Security-Announce@www.turbolinux.com
http://www.turbolinux.com/mailman/listinfo/tl-security-announce