CVE-2005-2972

NameCVE-2005-2972
DescriptionMultiple stack-based buffer overflows in the RTF import feature in AbiWord before 2.2.11 allow user-assisted attackers to execute arbitrary code via an RTF file with long identifiers, which are not properly handled in the (1) ParseLevelText, (2) getCharsInsideBrace, (3) HandleLists, (4) or (5) HandleAbiLists functions in ie_imp_RTF.cpp, a different vulnerability than CVE-2005-2964.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-894-1
NVD severitymedium
Debian Bugs333740

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
abiword (PTS)stretch3.0.2-2+deb9u2fixed
buster3.0.2-8fixed
bullseye3.0.4~dfsg-3fixed
bookworm, sid3.0.5~dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
abiwordsourcewoody1.0.2+cvs.2002.06.05-1woody3DSA-894-1
abiwordsourcesarge2.2.7-3sarge2DSA-894-1
abiwordsource(unstable)2.4.1-1medium333740

Search for package or bug name: Reporting problems