CVE-2005-2971

Heap-based buffer overflow in the KWord RTF importer for KOffice 1.2.0 through 1.4.1 allows remote attackers to execute arbitrary code via a crafted RTF file.
References
Link Resource
http://scary.beasts.org/security/CESA-2005-005.txt Exploit Vendor Advisory
http://secunia.com/advisories/17145/ Patch Vendor Advisory
http://secunia.com/advisories/17171
http://secunia.com/advisories/17190
http://secunia.com/advisories/17212
http://secunia.com/advisories/17332
http://secunia.com/advisories/17480
http://secunia.com/advisories/17486
http://securitytracker.com/id?1015035
http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.388487
http://www.debian.org/security/2005/dsa-872
http://www.gentoo.org/security/en/glsa/glsa-200510-12.xml Patch Vendor Advisory
http://www.kde.org/info/security/advisory-20051011-1.txt Patch Vendor Advisory
http://www.novell.com/linux/security/advisories/2005_25_sr.html
http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00042.html
http://www.securityfocus.com/bid/15060 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/22562
https://usn.ubuntu.com/202-1/
http://scary.beasts.org/security/CESA-2005-005.txt Exploit Vendor Advisory
http://secunia.com/advisories/17145/ Patch Vendor Advisory
http://secunia.com/advisories/17171
http://secunia.com/advisories/17190
http://secunia.com/advisories/17212
http://secunia.com/advisories/17332
http://secunia.com/advisories/17480
http://secunia.com/advisories/17486
http://securitytracker.com/id?1015035
http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.388487
http://www.debian.org/security/2005/dsa-872
http://www.gentoo.org/security/en/glsa/glsa-200510-12.xml Patch Vendor Advisory
http://www.kde.org/info/security/advisory-20051011-1.txt Patch Vendor Advisory
http://www.novell.com/linux/security/advisories/2005_25_sr.html
http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00042.html
http://www.securityfocus.com/bid/15060 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/22562
https://usn.ubuntu.com/202-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:kde:koffice:1.2:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*
cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2005-10-20 10:02

Updated : 2025-04-03 01:03


NVD link : CVE-2005-2971

Mitre link : CVE-2005-2971

CVE.ORG link : CVE-2005-2971


JSON object : View

Products Affected

kde

  • koffice