← Retour aux CVEs
CVE-2005-2972
N/ADescription
Multiple stack-based buffer overflows in the RTF import feature in AbiWord before 2.2.11 allow user-assisted attackers to execute arbitrary code via an RTF file with long identifiers, which are not properly handled in the (1) ParseLevelText, (2) getCharsInsideBrace, (3) HandleLists, (4) or (5) HandleAbiLists functions in ie_imp_RTF.cpp, a different vulnerability than CVE-2005-2964.
Details CVE
Score CVSS v3.1N/A
Publie10/23/2005
Derniere modification4/16/2026
Sourcenvd
Observations honeypot0
Produits affectes
abisource:community_abiword
Faiblesses (CWE)
CWE-119
References
http://scary.beasts.org/security/CESA-2005-006.txt(secalert@redhat.com)
http://secunia.com/advisories/17199(secalert@redhat.com)
http://secunia.com/advisories/17200(secalert@redhat.com)
http://secunia.com/advisories/17213(secalert@redhat.com)
http://secunia.com/advisories/17264(secalert@redhat.com)
http://secunia.com/advisories/17551(secalert@redhat.com)
http://www.abisource.com/changelogs/2.2.11.phtml(secalert@redhat.com)
http://www.debian.org/security/2005/dsa-894(secalert@redhat.com)
http://www.gentoo.org/security/en/glsa/glsa-200510-17.xml(secalert@redhat.com)
http://www.mail-archive.com/debian-bugs-rc%40lists.debian.org/msg28251.html(secalert@redhat.com)
http://www.osvdb.org/20015(secalert@redhat.com)
http://www.securityfocus.com/bid/15096(secalert@redhat.com)
http://www.vupen.com/english/advisories/2005/2086(secalert@redhat.com)
https://usn.ubuntu.com/203-1/(secalert@redhat.com)
http://scary.beasts.org/security/CESA-2005-006.txt(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17199(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17200(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17213(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17264(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17551(af854a3a-2127-422b-91ae-364da2661108)
http://www.abisource.com/changelogs/2.2.11.phtml(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2005/dsa-894(af854a3a-2127-422b-91ae-364da2661108)
http://www.gentoo.org/security/en/glsa/glsa-200510-17.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.mail-archive.com/debian-bugs-rc%40lists.debian.org/msg28251.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/20015(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/15096(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2005/2086(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/203-1/(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.