ID CVE-2006-2197
Summary Integer overflow in wv2 before 0.2.3 might allow context-dependent attackers to execute arbitrary code via a crafted Microsoft Word document.
References
Vulnerable Configurations
  • cpe:2.3:a:wvware:wv2:0.2.2
    cpe:2.3:a:wvware:wv2:0.2.2
  • cpe:2.3:a:wvware:wv2:0.2.3
    cpe:2.3:a:wvware:wv2:0.2.3
CVSS
Base: 6.5 (as of 15-06-2006 - 09:44)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE_INSTANCE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id SUSE_WV2-1687.NASL
    description The wv2 library was updated to fix some boundary checks which could be exploited by maliciously crafted files to access memory outside bounds and possibly execute arbitrary code. (CVE-2006-2197)
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 27480
    published 2007-10-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=27480
    title openSUSE 10 Security Update : wv2 (wv2-1687)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-300-1.NASL
    description libwv2 did not sufficiently check the validity of its input. Certain invalid Word documents caused a buffer overflow. By tricking a user into opening a specially crafted Word file with an application that uses libwv2, this could be exploited to execute arbitrary code with the user's privileges. The only packaged application using this library is KWord. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 27875
    published 2007-11-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=27875
    title Ubuntu 5.04 / 5.10 / 6.06 LTS : wv2 vulnerability (USN-300-1)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2006-109.NASL
    description A boundary checking error was discovered in the wv2 library, used for accessing Microsoft Word documents. This error can lead to an integer overflow induced by processing certain Word files. The updated packages have been patched to correct these issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 21753
    published 2006-06-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21753
    title Mandrake Linux Security Advisory : wv2 (MDKSA-2006:109)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-1100.NASL
    description A boundary checking error has been discovered in wv2, a library for accessing Microsoft Word documents, which can lead to an integer overflow induced by processing word files.
    last seen 2019-02-21
    modified 2018-08-09
    plugin id 22642
    published 2006-10-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=22642
    title Debian DSA-1100-1 : wv2 - integer overflow
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200606-24.NASL
    description The remote host is affected by the vulnerability described in GLSA-200606-24 (wv2: Integer overflow) A boundary checking error was found in wv2, which could lead to an integer overflow. Impact : An attacker could execute arbitrary code with the rights of the user running the program that uses the library via a maliciously crafted Microsoft Word document. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-08-10
    plugin id 21750
    published 2006-06-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21750
    title GLSA-200606-24 : wv2: Integer overflow
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_B9044CC28AA511DBBD0D00123FFE8333.NASL
    description Secunia reports : A vulnerability has been reported in wvWare wv2 Library, which potentially can be exploited by malicious people to compromise an application using the library. The vulnerability is caused due to an integer overflow error in 'word_helper.h' when handling a Word document. This can be exploited to cause a buffer overflow and may allow arbitrary code execution via a specially crafted Word document.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 23850
    published 2006-12-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=23850
    title FreeBSD : wv2 -- Integer Overflow Vulnerability (b9044cc2-8aa5-11db-bd0d-00123ffe8333)
refmap via4
bid 18437
confirm http://sourceforge.net/project/shownotes.php?group_id=10501&release_id=424094
debian DSA-1100
gentoo GLSA-200606-24
mandriva MDKSA-2006:109
sectrack 1016313
secunia
  • 20665
  • 20688
  • 20689
  • 20826
  • 20844
  • 20899
suse SUSE-SR:2006:015
ubuntu USN-300-1
vupen ADV-2006-2350
xf wvware-wv2-word-overflow(27184)
Last major update 11-10-2011 - 00:00
Published 15-06-2006 - 06:02
Last modified 03-10-2018 - 17:40
Back to Top