5.1
CVSSv2

CVE-2005-2972

Published: 23/10/2005 Updated: 07/11/2023
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 454
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple stack-based buffer overflows in the RTF import feature in AbiWord prior to 2.2.11 allow user-assisted malicious users to execute arbitrary code via an RTF file with long identifiers, which are not properly handled in the (1) ParseLevelText, (2) getCharsInsideBrace, (3) HandleLists, (4) or (5) HandleAbiLists functions in ie_imp_RTF.cpp, a different vulnerability than CVE-2005-2964.

Vulnerable Product Search on Vulmon Subscribe to Product

abisource community abiword

Vendor Advisories

Chris Evans discovered several buffer overflows in the RTF import module of AbiWord By tricking a user into opening an RTF file with specially crafted long identifiers, an attacker could exploit this to execute arbitrary code with the privileges of the AbiWord user ...
Chris Evans discovered several buffer overflows in the RTF import mechanism of AbiWord, a WYSIWYG word processor based on GTK 2 Opening a specially crafted RTF file could lead to the execution of arbitrary code For the old stable distribution (woody) these problems have been fixed in version 102+cvs20020605-1woody3 For the stable distributi ...