← Back to CVEs
CVE-2005-2972
N/ADescription
Multiple stack-based buffer overflows in the RTF import feature in AbiWord before 2.2.11 allow user-assisted attackers to execute arbitrary code via an RTF file with long identifiers, which are not properly handled in the (1) ParseLevelText, (2) getCharsInsideBrace, (3) HandleLists, (4) or (5) HandleAbiLists functions in ie_imp_RTF.cpp, a different vulnerability than CVE-2005-2964.
CVE Details
CVSS v3.1 ScoreN/A
Published10/23/2005
Last Modified4/16/2026
Sourcenvd
Honeypot Sightings0
Affected Products
abisource:community_abiword
Weaknesses (CWE)
CWE-119
References
http://scary.beasts.org/security/CESA-2005-006.txt(secalert@redhat.com)
http://secunia.com/advisories/17199(secalert@redhat.com)
http://secunia.com/advisories/17200(secalert@redhat.com)
http://secunia.com/advisories/17213(secalert@redhat.com)
http://secunia.com/advisories/17264(secalert@redhat.com)
http://secunia.com/advisories/17551(secalert@redhat.com)
http://www.abisource.com/changelogs/2.2.11.phtml(secalert@redhat.com)
http://www.debian.org/security/2005/dsa-894(secalert@redhat.com)
http://www.gentoo.org/security/en/glsa/glsa-200510-17.xml(secalert@redhat.com)
http://www.mail-archive.com/debian-bugs-rc%40lists.debian.org/msg28251.html(secalert@redhat.com)
http://www.osvdb.org/20015(secalert@redhat.com)
http://www.securityfocus.com/bid/15096(secalert@redhat.com)
http://www.vupen.com/english/advisories/2005/2086(secalert@redhat.com)
https://usn.ubuntu.com/203-1/(secalert@redhat.com)
http://scary.beasts.org/security/CESA-2005-006.txt(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17199(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17200(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17213(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17264(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17551(af854a3a-2127-422b-91ae-364da2661108)
http://www.abisource.com/changelogs/2.2.11.phtml(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2005/dsa-894(af854a3a-2127-422b-91ae-364da2661108)
http://www.gentoo.org/security/en/glsa/glsa-200510-17.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.mail-archive.com/debian-bugs-rc%40lists.debian.org/msg28251.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/20015(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/15096(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2005/2086(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/203-1/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.