CVE-2005-2971

Heap-based buffer overflow in the KWord RTF importer for KOffice 1.2.0 through 1.4.1 allows remote attackers to execute arbitrary code via a crafted RTF file.
References
Link Resource
http://scary.beasts.org/security/CESA-2005-005.txt Exploit Vendor Advisory
http://secunia.com/advisories/17145/ Patch Vendor Advisory
http://secunia.com/advisories/17171
http://secunia.com/advisories/17190
http://secunia.com/advisories/17212
http://secunia.com/advisories/17332
http://secunia.com/advisories/17480
http://secunia.com/advisories/17486
http://securitytracker.com/id?1015035
http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.388487
http://www.debian.org/security/2005/dsa-872
http://www.gentoo.org/security/en/glsa/glsa-200510-12.xml Patch Vendor Advisory
http://www.kde.org/info/security/advisory-20051011-1.txt Patch Vendor Advisory
http://www.novell.com/linux/security/advisories/2005_25_sr.html
http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00042.html
http://www.securityfocus.com/bid/15060 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/22562
https://usn.ubuntu.com/202-1/
http://scary.beasts.org/security/CESA-2005-005.txt Exploit Vendor Advisory
http://secunia.com/advisories/17145/ Patch Vendor Advisory
http://secunia.com/advisories/17171
http://secunia.com/advisories/17190
http://secunia.com/advisories/17212
http://secunia.com/advisories/17332
http://secunia.com/advisories/17480
http://secunia.com/advisories/17486
http://securitytracker.com/id?1015035
http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.388487
http://www.debian.org/security/2005/dsa-872
http://www.gentoo.org/security/en/glsa/glsa-200510-12.xml Patch Vendor Advisory
http://www.kde.org/info/security/advisory-20051011-1.txt Patch Vendor Advisory
http://www.novell.com/linux/security/advisories/2005_25_sr.html
http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00042.html
http://www.securityfocus.com/bid/15060 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/22562
https://usn.ubuntu.com/202-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:kde:koffice:1.2:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:00

Type Values Removed Values Added
References () http://scary.beasts.org/security/CESA-2005-005.txt - Exploit, Vendor Advisory () http://scary.beasts.org/security/CESA-2005-005.txt - Exploit, Vendor Advisory
References () http://secunia.com/advisories/17145/ - Patch, Vendor Advisory () http://secunia.com/advisories/17145/ - Patch, Vendor Advisory
References () http://secunia.com/advisories/17171 - () http://secunia.com/advisories/17171 -
References () http://secunia.com/advisories/17190 - () http://secunia.com/advisories/17190 -
References () http://secunia.com/advisories/17212 - () http://secunia.com/advisories/17212 -
References () http://secunia.com/advisories/17332 - () http://secunia.com/advisories/17332 -
References () http://secunia.com/advisories/17480 - () http://secunia.com/advisories/17480 -
References () http://secunia.com/advisories/17486 - () http://secunia.com/advisories/17486 -
References () http://securitytracker.com/id?1015035 - () http://securitytracker.com/id?1015035 -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.388487 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.388487 -
References () http://www.debian.org/security/2005/dsa-872 - () http://www.debian.org/security/2005/dsa-872 -
References () http://www.gentoo.org/security/en/glsa/glsa-200510-12.xml - Patch, Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200510-12.xml - Patch, Vendor Advisory
References () http://www.kde.org/info/security/advisory-20051011-1.txt - Patch, Vendor Advisory () http://www.kde.org/info/security/advisory-20051011-1.txt - Patch, Vendor Advisory
References () http://www.novell.com/linux/security/advisories/2005_25_sr.html - () http://www.novell.com/linux/security/advisories/2005_25_sr.html -
References () http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00042.html - () http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00042.html -
References () http://www.securityfocus.com/bid/15060 - Patch () http://www.securityfocus.com/bid/15060 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/22562 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/22562 -
References () https://usn.ubuntu.com/202-1/ - () https://usn.ubuntu.com/202-1/ -

Information

Published : 2005-10-20 10:02

Updated : 2024-11-21 00:00


NVD link : CVE-2005-2971

Mitre link : CVE-2005-2971

CVE.ORG link : CVE-2005-2971


JSON object : View

Products Affected

kde

  • koffice