118 lines
3.2 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2005-2972",
"sourceIdentifier": "secalert@redhat.com",
"published": "2005-10-23T10:02:00.000",
"lastModified": "2018-10-03T21:31:20.483",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple stack-based buffer overflows in the RTF import feature in AbiWord before 2.2.11 allow user-assisted attackers to execute arbitrary code via an RTF file with long identifiers, which are not properly handled in the (1) ParseLevelText, (2) getCharsInsideBrace, (3) HandleLists, (4) or (5) HandleAbiLists functions in ie_imp_RTF.cpp, a different vulnerability than CVE-2005-2964."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abisource:community_abiword:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.2.10",
"matchCriteriaId": "576159E7-70BC-45EB-8F7A-E60809AD1CE3"
}
]
}
]
}
],
"references": [
{
"url": "http://scary.beasts.org/security/CESA-2005-006.txt",
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.abisource.com/changelogs/2.2.11.phtml",
"source": "secalert@redhat.com"
},
{
"url": "http://www.debian.org/security/2005/dsa-894",
"source": "secalert@redhat.com"
},
{
"url": "http://www.gentoo.org/security/en/glsa/glsa-200510-17.xml",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.mail-archive.com/debian-bugs-rc@lists.debian.org/msg28251.html",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/15096",
"source": "secalert@redhat.com"
},
{
"url": "http://www.vupen.com/english/advisories/2005/2086",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://usn.ubuntu.com/203-1/",
"source": "secalert@redhat.com"
}
]
}