FreeBSD : abiword, koffice -- stack based buffer overflow vulnerabilities (9cd52bc6-a213-11da-b410-000e0c2e438a)

medium Nessus Plugin ID 21486

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Chris Evans reports that AbiWord is vulnerable to multiple stack-based buffer overflow vulnerabilities. This is caused by improper checking of the user-supplied data before it is being copied to an too small buffer. The vulnerability is triggered when someone is importing RTF files.

Solution

Update the affected packages.

See Also

http://scary.beasts.org/security/CESA-2005-006.txt

https://www.abisource.com/changelogs/2.2.11.phtml

https://www.kde.org/info/security/advisory-20051011-1.txt

http://www.nessus.org/u?b61c70b4

Plugin Details

Severity: Medium

ID: 21486

File Name: freebsd_pkg_9cd52bc6a21311dab410000e0c2e438a.nasl

Version: 1.23

Type: local

Published: 5/13/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 3.8

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:abiword, p-cpe:/a:freebsd:freebsd:koffice, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 2/20/2006

Vulnerability Publication Date: 10/14/2005

Reference Information

CVE: CVE-2005-2972

BID: 15096