← Zuruck zu CVEs
CVE-2005-2972
N/ABeschreibung
Multiple stack-based buffer overflows in the RTF import feature in AbiWord before 2.2.11 allow user-assisted attackers to execute arbitrary code via an RTF file with long identifiers, which are not properly handled in the (1) ParseLevelText, (2) getCharsInsideBrace, (3) HandleLists, (4) or (5) HandleAbiLists functions in ie_imp_RTF.cpp, a different vulnerability than CVE-2005-2964.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht10/23/2005
Zuletzt geandert4/16/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
abisource:community_abiword
Schwachen (CWE)
CWE-119
Referenzen
http://scary.beasts.org/security/CESA-2005-006.txt(secalert@redhat.com)
http://secunia.com/advisories/17199(secalert@redhat.com)
http://secunia.com/advisories/17200(secalert@redhat.com)
http://secunia.com/advisories/17213(secalert@redhat.com)
http://secunia.com/advisories/17264(secalert@redhat.com)
http://secunia.com/advisories/17551(secalert@redhat.com)
http://www.abisource.com/changelogs/2.2.11.phtml(secalert@redhat.com)
http://www.debian.org/security/2005/dsa-894(secalert@redhat.com)
http://www.gentoo.org/security/en/glsa/glsa-200510-17.xml(secalert@redhat.com)
http://www.mail-archive.com/debian-bugs-rc%40lists.debian.org/msg28251.html(secalert@redhat.com)
http://www.osvdb.org/20015(secalert@redhat.com)
http://www.securityfocus.com/bid/15096(secalert@redhat.com)
http://www.vupen.com/english/advisories/2005/2086(secalert@redhat.com)
https://usn.ubuntu.com/203-1/(secalert@redhat.com)
http://scary.beasts.org/security/CESA-2005-006.txt(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17199(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17200(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17213(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17264(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17551(af854a3a-2127-422b-91ae-364da2661108)
http://www.abisource.com/changelogs/2.2.11.phtml(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2005/dsa-894(af854a3a-2127-422b-91ae-364da2661108)
http://www.gentoo.org/security/en/glsa/glsa-200510-17.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.mail-archive.com/debian-bugs-rc%40lists.debian.org/msg28251.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/20015(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/15096(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2005/2086(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/203-1/(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.