First published: Sun Oct 23 2005(Updated: )
Multiple stack-based buffer overflows in the RTF import feature in AbiWord before 2.2.11 allow user-assisted attackers to execute arbitrary code via an RTF file with long identifiers, which are not properly handled in the (1) ParseLevelText, (2) getCharsInsideBrace, (3) HandleLists, (4) or (5) HandleAbiLists functions in ie_imp_RTF.cpp, a different vulnerability than CVE-2005-2964.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
AbiWord | <=2.2.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2972 has been classified as a high severity vulnerability due to its potential to allow arbitrary code execution.
To fix CVE-2005-2972, upgrade to AbiWord version 2.2.11 or later, which addresses the buffer overflow issues.
CVE-2005-2972 affects AbiWord versions prior to 2.2.11, specifically those versions before 2.2.10.
CVE-2005-2972 is associated with user-assisted attacks that exploit the vulnerability through specially crafted RTF files.
To determine if your system is vulnerable to CVE-2005-2972, check the version of AbiWord installed and ensure it is updated to 2.2.11 or later.