Multiple stack-based buffer overflows in the RTF import feature in AbiWord before 2.2.11 allow user-assisted attackers to execute arbitrary code via an RTF file with long identifiers, which are not properly handled in the (1) ParseLevelText, (2) getCharsInsideBrace, (3) HandleLists, (4) or (5) HandleAbiLists functions in ie_imp_RTF.cpp, a different vulnerability than CVE-2005-2964.
References
Configurations
History
21 Nov 2024, 00:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://scary.beasts.org/security/CESA-2005-006.txt - Exploit, Vendor Advisory | |
References | () http://secunia.com/advisories/17199 - Vendor Advisory | |
References | () http://secunia.com/advisories/17200 - Vendor Advisory | |
References | () http://secunia.com/advisories/17213 - Vendor Advisory | |
References | () http://secunia.com/advisories/17264 - Vendor Advisory | |
References | () http://secunia.com/advisories/17551 - Vendor Advisory | |
References | () http://www.abisource.com/changelogs/2.2.11.phtml - | |
References | () http://www.debian.org/security/2005/dsa-894 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200510-17.xml - Patch, Vendor Advisory | |
References | () http://www.mail-archive.com/debian-bugs-rc%40lists.debian.org/msg28251.html - | |
References | () http://www.osvdb.org/20015 - | |
References | () http://www.securityfocus.com/bid/15096 - | |
References | () http://www.vupen.com/english/advisories/2005/2086 - Vendor Advisory | |
References | () https://usn.ubuntu.com/203-1/ - |
Information
Published : 2005-10-23 10:02
Updated : 2024-11-21 00:00
NVD link : CVE-2005-2972
Mitre link : CVE-2005-2972
CVE.ORG link : CVE-2005-2972
JSON object : View
Products Affected
abisource
- community_abiword
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer