CVE-2005-2972

high

Description

Multiple stack-based buffer overflows in the RTF import feature in AbiWord before 2.2.11 allow user-assisted attackers to execute arbitrary code via an RTF file with long identifiers, which are not properly handled in the (1) ParseLevelText, (2) getCharsInsideBrace, (3) HandleLists, (4) or (5) HandleAbiLists functions in ie_imp_RTF.cpp, a different vulnerability than CVE-2005-2964.

References

https://usn.ubuntu.com/203-1/

http://www.vupen.com/english/advisories/2005/2086

http://www.securityfocus.com/bid/15096

http://www.osvdb.org/20015

http://www.mail-archive.com/debian-bugs-rc%40lists.debian.org/msg28251.html

http://www.gentoo.org/security/en/glsa/glsa-200510-17.xml

http://www.debian.org/security/2005/dsa-894

http://www.abisource.com/changelogs/2.2.11.phtml

http://secunia.com/advisories/17551

http://secunia.com/advisories/17264

http://secunia.com/advisories/17213

http://secunia.com/advisories/17200

http://secunia.com/advisories/17199

Details

Source: Mitre, NVD

Published: 2005-10-23

Updated: 2023-11-07

Risk Information

CVSS v2

Base Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Severity: High