CVE-2005-2971
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
20/10/2005
Last modified:
03/10/2018
Description
Heap-based buffer overflow in the KWord RTF importer for KOffice 1.2.0 through 1.4.1 allows remote attackers to execute arbitrary code via a crafted RTF file.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:kde:koffice:1.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:kde:koffice:1.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:kde:koffice:1.3.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:kde:koffice:1.3.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:* | ||
cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:* | ||
cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:* | ||
cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://scary.beasts.org/security/CESA-2005-005.txt
- http://secunia.com/advisories/17145/
- http://secunia.com/advisories/17171
- http://secunia.com/advisories/17190
- http://secunia.com/advisories/17212
- http://secunia.com/advisories/17332
- http://secunia.com/advisories/17480
- http://secunia.com/advisories/17486
- http://securitytracker.com/id?1015035=
- http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.388487
- http://www.debian.org/security/2005/dsa-872
- http://www.gentoo.org/security/en/glsa/glsa-200510-12.xml
- http://www.kde.org/info/security/advisory-20051011-1.txt
- http://www.novell.com/linux/security/advisories/2005_25_sr.html
- http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00042.html
- http://www.securityfocus.com/bid/15060
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22562
- https://usn.ubuntu.com/202-1/