blob: c2a219279975503543f2f8e05f79fad866df16aa [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200510-17">
<title>AbiWord: New RTF import buffer overflows</title>
AbiWord is vulnerable to an additional set of buffer overflows during RTF
import, making it vulnerable to the execution of arbitrary code.
<product type="ebuild">AbiWord</product>
<announced>October 20, 2005</announced>
<revised>October 20, 2005: 01</revised>
<package name="app-office/abiword" auto="yes" arch="*">
<unaffected range="ge">2.2.11</unaffected>
<vulnerable range="lt">2.2.11</vulnerable>
AbiWord is a free and cross-platform word processing program. It
allows to import RTF files into AbiWord documents.
Chris Evans discovered a different set of buffer overflows than
the one described in GLSA 200509-20 in the RTF import function in
<impact type="normal">
An attacker could design a malicious RTF file and entice a user to
import it in AbiWord, potentially resulting in the execution of
arbitrary code with the rights of the user running AbiWord.
There is no known workaround at this time.
All AbiWord users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-office/abiword-2.2.11&quot;</code>
<uri link="/security/en/glsa/glsa-200509-20.xml">GLSA-200509-20</uri>
<uri link="">CAN-2005-2972</uri>
<metadata tag="requester" timestamp="Tue, 18 Oct 2005 07:36:44 +0000">
<metadata tag="submitter" timestamp="Tue, 18 Oct 2005 14:22:32 +0000">
<metadata tag="bugReady" timestamp="Thu, 20 Oct 2005 05:41:16 +0000">