← Retour aux CVEs
CVE-2005-2971
N/ADescription
Heap-based buffer overflow in the KWord RTF importer for KOffice 1.2.0 through 1.4.1 allows remote attackers to execute arbitrary code via a crafted RTF file.
Details CVE
Score CVSS v3.1N/A
Publie10/20/2005
Derniere modification4/16/2026
Sourcenvd
Observations honeypot0
Produits affectes
kde:koffice
References
http://scary.beasts.org/security/CESA-2005-005.txt(secalert@redhat.com)
http://secunia.com/advisories/17145/(secalert@redhat.com)
http://secunia.com/advisories/17171(secalert@redhat.com)
http://secunia.com/advisories/17190(secalert@redhat.com)
http://secunia.com/advisories/17212(secalert@redhat.com)
http://secunia.com/advisories/17332(secalert@redhat.com)
http://secunia.com/advisories/17480(secalert@redhat.com)
http://secunia.com/advisories/17486(secalert@redhat.com)
http://securitytracker.com/id?1015035(secalert@redhat.com)
http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.388487(secalert@redhat.com)
http://www.debian.org/security/2005/dsa-872(secalert@redhat.com)
http://www.gentoo.org/security/en/glsa/glsa-200510-12.xml(secalert@redhat.com)
http://www.kde.org/info/security/advisory-20051011-1.txt(secalert@redhat.com)
http://www.novell.com/linux/security/advisories/2005_25_sr.html(secalert@redhat.com)
http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00042.html(secalert@redhat.com)
http://www.securityfocus.com/bid/15060(secalert@redhat.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22562(secalert@redhat.com)
https://usn.ubuntu.com/202-1/(secalert@redhat.com)
http://scary.beasts.org/security/CESA-2005-005.txt(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17145/(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17171(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17190(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17212(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17332(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17480(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17486(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1015035(af854a3a-2127-422b-91ae-364da2661108)
http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.388487(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2005/dsa-872(af854a3a-2127-422b-91ae-364da2661108)
http://www.gentoo.org/security/en/glsa/glsa-200510-12.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.kde.org/info/security/advisory-20051011-1.txt(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2005_25_sr.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00042.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/15060(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22562(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/202-1/(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.