CVE-2005-2972

Multiple stack-based buffer overflows in the RTF import feature in AbiWord before 2.2.11 allow user-assisted attackers to execute arbitrary code via an RTF file with long identifiers, which are not properly handled in the (1) ParseLevelText, (2) getCharsInsideBrace, (3) HandleLists, (4) or (5) HandleAbiLists functions in ie_imp_RTF.cpp, a different vulnerability than CVE-2005-2964.
References
Link Resource
http://scary.beasts.org/security/CESA-2005-006.txt Exploit Vendor Advisory
http://secunia.com/advisories/17199 Vendor Advisory
http://secunia.com/advisories/17200 Vendor Advisory
http://secunia.com/advisories/17213 Vendor Advisory
http://secunia.com/advisories/17264 Vendor Advisory
http://secunia.com/advisories/17551 Vendor Advisory
http://www.abisource.com/changelogs/2.2.11.phtml
http://www.debian.org/security/2005/dsa-894
http://www.gentoo.org/security/en/glsa/glsa-200510-17.xml Patch Vendor Advisory
http://www.mail-archive.com/debian-bugs-rc%40lists.debian.org/msg28251.html
http://www.osvdb.org/20015
http://www.securityfocus.com/bid/15096
http://www.vupen.com/english/advisories/2005/2086 Vendor Advisory
https://usn.ubuntu.com/203-1/
http://scary.beasts.org/security/CESA-2005-006.txt Exploit Vendor Advisory
http://secunia.com/advisories/17199 Vendor Advisory
http://secunia.com/advisories/17200 Vendor Advisory
http://secunia.com/advisories/17213 Vendor Advisory
http://secunia.com/advisories/17264 Vendor Advisory
http://secunia.com/advisories/17551 Vendor Advisory
http://www.abisource.com/changelogs/2.2.11.phtml
http://www.debian.org/security/2005/dsa-894
http://www.gentoo.org/security/en/glsa/glsa-200510-17.xml Patch Vendor Advisory
http://www.mail-archive.com/debian-bugs-rc%40lists.debian.org/msg28251.html
http://www.osvdb.org/20015
http://www.securityfocus.com/bid/15096
http://www.vupen.com/english/advisories/2005/2086 Vendor Advisory
https://usn.ubuntu.com/203-1/
Configurations

Configuration 1 (hide)

cpe:2.3:a:abisource:community_abiword:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:00

Type Values Removed Values Added
References () http://scary.beasts.org/security/CESA-2005-006.txt - Exploit, Vendor Advisory () http://scary.beasts.org/security/CESA-2005-006.txt - Exploit, Vendor Advisory
References () http://secunia.com/advisories/17199 - Vendor Advisory () http://secunia.com/advisories/17199 - Vendor Advisory
References () http://secunia.com/advisories/17200 - Vendor Advisory () http://secunia.com/advisories/17200 - Vendor Advisory
References () http://secunia.com/advisories/17213 - Vendor Advisory () http://secunia.com/advisories/17213 - Vendor Advisory
References () http://secunia.com/advisories/17264 - Vendor Advisory () http://secunia.com/advisories/17264 - Vendor Advisory
References () http://secunia.com/advisories/17551 - Vendor Advisory () http://secunia.com/advisories/17551 - Vendor Advisory
References () http://www.abisource.com/changelogs/2.2.11.phtml - () http://www.abisource.com/changelogs/2.2.11.phtml -
References () http://www.debian.org/security/2005/dsa-894 - () http://www.debian.org/security/2005/dsa-894 -
References () http://www.gentoo.org/security/en/glsa/glsa-200510-17.xml - Patch, Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200510-17.xml - Patch, Vendor Advisory
References () http://www.mail-archive.com/debian-bugs-rc%40lists.debian.org/msg28251.html - () http://www.mail-archive.com/debian-bugs-rc%40lists.debian.org/msg28251.html -
References () http://www.osvdb.org/20015 - () http://www.osvdb.org/20015 -
References () http://www.securityfocus.com/bid/15096 - () http://www.securityfocus.com/bid/15096 -
References () http://www.vupen.com/english/advisories/2005/2086 - Vendor Advisory () http://www.vupen.com/english/advisories/2005/2086 - Vendor Advisory
References () https://usn.ubuntu.com/203-1/ - () https://usn.ubuntu.com/203-1/ -

07 Nov 2023, 01:57

Type Values Removed Values Added
References
  • {'url': 'http://www.mail-archive.com/debian-bugs-rc@lists.debian.org/msg28251.html', 'name': 'http://www.mail-archive.com/debian-bugs-rc@lists.debian.org/msg28251.html', 'tags': ['Vendor Advisory'], 'refsource': 'MISC'}
  • () http://www.mail-archive.com/debian-bugs-rc%40lists.debian.org/msg28251.html -

Information

Published : 2005-10-23 10:02

Updated : 2024-11-21 00:00


NVD link : CVE-2005-2972

Mitre link : CVE-2005-2972

CVE.ORG link : CVE-2005-2972


JSON object : View

Products Affected

abisource

  • community_abiword
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer