GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Fri Sep 30, 2005 10:09 am Post subject: [ GLSA 200509-20 ] AbiWord: RTF import stack-based buffer ov |
|
|
Gentoo Linux Security Advisory
Title: AbiWord: RTF import stack-based buffer overflow (GLSA 200509-20)
Severity: normal
Exploitable: remote
Date: September 30, 2005
Bug(s): #107351
ID: 200509-20
Synopsis
AbiWord is vulnerable to a stack-based buffer overflow during RTF import,
making it vulnerable to the execution of arbitrary code.
Background
AbiWord is a free and cross-platform word processing program. It
allows to import RTF files into AbiWord documents.
Affected Packages
Package: app-office/abiword
Vulnerable: < 2.2.10
Unaffected: >= 2.2.10
Architectures: All supported architectures
Description
Chris Evans discovered that the RTF import function in AbiWord is
vulnerable to a stack-based buffer overflow.
Impact
An attacker could design a malicious RTF file and entice the user
to import it in AbiWord, potentially resulting in the execution of
arbitrary code with the rights of the user running AbiWord.
Workaround
There is no known workaround at this time.
Resolution
All AbiWord users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/abiword-2.2.10" |
References
CAN-2005-2964
Last edited by GLSA on Sun Oct 13, 2013 4:21 am; edited 3 times in total |
|