|
Test ID: | 1.3.6.1.4.1.25623.1.0.56317 |
Category: | FreeBSD Local Security Checks |
Title: | FreeBSD Ports: koffice |
Summary: | FreeBSD Ports: koffice |
Description: | Description: The remote host is missing an update to the system as announced in the referenced advisory. The following packages are affected: koffice abiword CVE-2005-2972 Multiple stack-based buffer overflows in the RTF import feature in AbiWord before 2.2.11 allow user-complicit attackers to execute arbitrary code via an RTF file with long identifiers, which are not properly handled in the (1) ParseLevelText, (2) getCharsInsideBrace, (3) HandleLists, (4) or (5) HandleAbiLists functions in ie_imp_RTF.cpp, a different vulnerability than CVE-2005-2964. Solution: Update your system with the appropriate patches or software upgrades. http://scary.beasts.org/security/CESA-2005-006.txt http://www.abisource.com/changelogs/2.2.11.phtml http://www.kde.org/info/security/advisory-20051011-1.txt http://www.vuxml.org/freebsd/9cd52bc6-a213-11da-b410-000e0c2e438a.html CVSS Score: 5.1 CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P |
Cross-Ref: |
BugTraq ID: 15096 Common Vulnerability Exposure (CVE) ID: CVE-2005-2972 http://scary.beasts.org/security/CESA-2005-006.txt http://www.mail-archive.com/debian-bugs-rc@lists.debian.org/msg28251.html Debian Security Information: DSA-894 (Google Search) http://www.debian.org/security/2005/dsa-894 http://www.gentoo.org/security/en/glsa/glsa-200510-17.xml http://www.ubuntulinux.org/support/documentation/usn/usn-203-1 http://www.securityfocus.com/bid/15096 http://www.vupen.com/english/advisories/2005/2086 http://www.osvdb.org/20015 http://secunia.com/advisories/17199 http://secunia.com/advisories/17200 http://secunia.com/advisories/17213 http://secunia.com/advisories/17264 http://secunia.com/advisories/17551 |
Copyright | Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com |
This is only one of 58962 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |
|