Multiple stack-based buffer overflows in the RTF import feature in AbiWord before 2.2.11 allow user-assisted attackers to execute arbitrary code via an RTF file with long identifiers, which are not properly handled in the (1) ParseLevelText, (2) getCharsInsideBrace, (3) HandleLists, (4) or (5) HandleAbiLists functions in ie_imp_RTF.cpp, a different vulnerability than CVE-2005-2964.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-894-1 | New AbiWord packages fix arbitrary code execution |
EUVD |
EUVD-2005-2972 | Multiple stack-based buffer overflows in the RTF import feature in AbiWord before 2.2.11 allow user-assisted attackers to execute arbitrary code via an RTF file with long identifiers, which are not properly handled in the (1) ParseLevelText, (2) getCharsInsideBrace, (3) HandleLists, (4) or (5) HandleAbiLists functions in ie_imp_RTF.cpp, a different vulnerability than CVE-2005-2964. |
Ubuntu USN |
USN-203-1 | Abiword vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T22:53:29.907Z
Reserved: 2005-09-19T00:00:00
Link: CVE-2005-2972
No data.
Status : Deferred
Published: 2005-10-23T10:02:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2005-2972
No data.
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN