blob: 3228b85ea9e7723b9d6aa382881d10e80fe03846 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200509-20">
<title>AbiWord: RTF import stack-based buffer overflow</title>
AbiWord is vulnerable to a stack-based buffer overflow during RTF import,
making it vulnerable to the execution of arbitrary code.
<product type="ebuild">AbiWord</product>
<announced>September 30, 2005</announced>
<revised>September 30, 2005: 01</revised>
<package name="app-office/abiword" auto="yes" arch="*">
<unaffected range="ge">2.2.10</unaffected>
<vulnerable range="lt">2.2.10</vulnerable>
AbiWord is a free and cross-platform word processing program. It
allows to import RTF files into AbiWord documents.
Chris Evans discovered that the RTF import function in AbiWord is
vulnerable to a stack-based buffer overflow.
<impact type="normal">
An attacker could design a malicious RTF file and entice the user
to import it in AbiWord, potentially resulting in the execution of
arbitrary code with the rights of the user running AbiWord.
There is no known workaround at this time.
All AbiWord users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-office/abiword-2.2.10&quot;</code>
<uri link="">CAN-2005-2964</uri>
<metadata tag="requester" timestamp="Wed, 28 Sep 2005 16:02:24 +0000">
<metadata tag="submitter" timestamp="Thu, 29 Sep 2005 12:13:23 +0000">
<metadata tag="bugReady" timestamp="Thu, 29 Sep 2005 20:47:05 +0000">