CVE-2008-3432

Vim 6.2-6.3 - Heap-Based Buffer Overflow via Shell Metacharacters in Filenames

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-3432. PoCs published by Brian Hirt.

AI-analyzed exploit summary The provided text describes a heap-based buffer overflow vulnerability in Vim versions 6.2.429 through 6.3.058, which could allow arbitrary code execution. However, no actual exploit code is included in the snippet.

Description

Heap-based buffer overflow in the mch_expand_wildcards function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames, as demonstrated by the netrw.v3 test case.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Brian Hirt · textremotelinux
https://www.exploit-db.com/exploits/32225

The provided text describes a heap-based buffer overflow vulnerability in Vim versions 6.2.429 through 6.3.058, which could allow arbitrary code execution. However, no actual exploit code is included in the snippet.

Classification
Writeup 90%
Attack Type
Rce
Complexity
Moderate
Reliability
Theoretical
Target: Vim 6.2.429 through 6.3.058
No auth needed
Prerequisites: User interaction to open a malicious file in Vim
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (22)

Core 22
Core References
Patch vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/31681
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11203
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/44722
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/30648
Issue Tracking x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=455455
Vendor Advisory vendor-advisory x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2008-0617.html
Mailing List mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2008/07/15/4
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/32858
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/33410
Mailing List mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2008/08/01/1
Various Sources x_refsource_confirm
ftp://ftp.vim.org/pub/vim/patches/6.2.429
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2009/0904
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2009/0033
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5987
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/502322/100/0/threaded
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/32222
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2008/2780
Various Sources x_refsource_confirm
ftp://ftp.vim.org/pub/vim/patches/6.3/6.3.059
Patch, Vendor Advisory vendor-advisory x_refsource_apple
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
Vendor Advisory x_refsource_confirm
http://support.apple.com/kb/HT3216

Scores

EPSS 0.2254
EPSS Percentile 95.9%

Details

CWE
CWE-119
Status published
Products (2)
vim/vim 6.2
vim/vim 6.3
Published Oct 10, 2008
Tracked Since Feb 18, 2026