Integer overflow in wv2 before 0.2.3 might allow context-dependent attackers to execute arbitrary code via a crafted Microsoft Word document.
References
Link | Resource |
---|---|
http://www.debian.org/security/2006/dsa-1100 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/18437 | Patch |
http://secunia.com/advisories/20665 | Patch Vendor Advisory |
http://secunia.com/advisories/20688 | Patch Vendor Advisory |
http://secunia.com/advisories/20689 | Patch Vendor Advisory |
http://www.gentoo.org/security/en/glsa/glsa-200606-24.xml | Patch Vendor Advisory |
http://securitytracker.com/id?1016313 | |
http://secunia.com/advisories/20826 | Vendor Advisory |
http://secunia.com/advisories/20844 | Vendor Advisory |
http://www.novell.com/linux/security/advisories/2006_38_security.html | |
http://secunia.com/advisories/20899 | Vendor Advisory |
http://sourceforge.net/project/shownotes.php?group_id=10501&release_id=424094 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:109 | |
http://www.vupen.com/english/advisories/2006/2350 | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27184 | |
https://usn.ubuntu.com/300-1/ |
Configurations
Configuration 1 (hide)
|
Information
Published : 2006-06-15 03:02
Updated : 2018-10-03 14:40
NVD link : CVE-2006-2197
Mitre link : CVE-2006-2197
JSON object : View
CWE
CWE-189
Numeric Errors
Products Affected
wvware
- wv2