Bug 170413
Summary: | CAN-2005-2964 AbiWord RTF File Processing Buffer Overflow | ||
---|---|---|---|
Product: | [Retired] Fedora Legacy | Reporter: | John Dalbec <jpdalbec> |
Component: | abiword | Assignee: | Fedora Legacy Bugs <bugs> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | rhl7.3 | ||
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | i386 | ||
OS: | Linux | ||
URL: | http://www.abisource.com/changelogs/2.2.10.phtml | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2007-08-30 19:57:10 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
John Dalbec
2005-10-11 14:14:42 UTC
05.42.20 CVE: CAN-2005-2972 Platform: Cross Platform Title: AbiWord Stack-Based Buffer Overflow Vulnerabilities Description: AbiWord is a word processor available for multiple operating systems.It is susceptible to multiple stack-based buffer overflow vulnerabilities that are caused by failure of the application to properly do bounds check on user-supplied data when RTF (Rich Text Files) files are imported into AbiWord. For a list of vulnerable versions, please visit the reference link provided. Ref: http://www.securityfocus.com/bid/15096 Fedora Legacy project has ended. These will not be fixed by Fedora Legacy. |