Ubuntu 5.04 / 5.10 / 6.06 LTS : wv2 vulnerability (USN-300-1)

Ubuntu Security Notice (C) 2006-2016 Canonical, Inc. / NASL script (C) 2007-2016 Tenable Network Security, Inc.

Synopsis :

The remote Ubuntu host is missing one or more security-related

Description :

libwv2 did not sufficiently check the validity of its input. Certain
invalid Word documents caused a buffer overflow. By tricking a user
into opening a specially crafted Word file with an application that
uses libwv2, this could be exploited to execute arbitrary code with
the user's privileges.

The only packaged application using this library is KWord.

Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

Solution :

Update the affected libwv2-1, libwv2-1c2 and / or libwv2-dev packages.

Risk factor :

Medium / CVSS Base Score : 6.5

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 27875 ()

Bugtraq ID:

CVE ID: CVE-2006-2197

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now