7.2 High
AI Score
Confidence
Low
5.1 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
0.021 Low
EPSS
Percentile
89.1%
Multiple stack-based buffer overflows in the RTF import feature in AbiWord before 2.2.11 allow user-assisted attackers to execute arbitrary code via an RTF file with long identifiers, which are not properly handled in the (1) ParseLevelText, (2) getCharsInsideBrace, (3) HandleLists, (4) or (5) HandleAbiLists functions in ie_imp_RTF.cpp, a different vulnerability than CVE-2005-2964.
CPE | Name | Operator | Version |
---|---|---|---|
abisource:community_abiword | abisource community abiword | le | 2.2.10 |
scary.beasts.org/security/CESA-2005-006.txt
secunia.com/advisories/17199
secunia.com/advisories/17200
secunia.com/advisories/17213
secunia.com/advisories/17264
secunia.com/advisories/17551
www.abisource.com/changelogs/2.2.11.phtml
www.debian.org/security/2005/dsa-894
www.gentoo.org/security/en/glsa/glsa-200510-17.xml
www.mail-archive.com/debian-bugs-rc%40lists.debian.org/msg28251.html
www.osvdb.org/20015
www.securityfocus.com/bid/15096
www.vupen.com/english/advisories/2005/2086
usn.ubuntu.com/203-1/