Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2007-5395
PUBLISHED
More InfoOfficial Page
Assigner-flexera
Assigner Org ID-44d08088-2bea-4760-83a6-1e9be26b15ab
View Known Exploited Vulnerability (KEV) details
Published At-08 Nov, 2007 | 02:00
Updated At-07 Aug, 2024 | 15:31
Rejected At-
▼CVE Numbering Authority (CNA)

Stack-based buffer overflow in the separate_word function in tokenize.c in Link Grammar 4.1b and possibly other versions, as used in AbiWord Link Grammar 4.2.4, allows remote attackers to execute arbitrary code via a long word, as reachable through the separate_sentence function.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/27340
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/bid/26365
vdb-entry
x_refsource_BID
http://secunia.com/secunia_research/2007-78/advisory/
x_refsource_MISC
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450695
x_refsource_CONFIRM
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00411.html
vendor-advisory
x_refsource_FEDORA
https://exchange.xforce.ibmcloud.com/vulnerabilities/38317
vdb-entry
x_refsource_XF
http://www.vupen.com/english/advisories/2007/3771
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/28101
third-party-advisory
x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200711-27.xml
vendor-advisory
x_refsource_GENTOO
http://www.vupen.com/english/advisories/2007/3770
vdb-entry
x_refsource_VUPEN
http://www.debian.org/security/2007/dsa-1432
vendor-advisory
x_refsource_DEBIAN
http://bugs.gentoo.org/show_bug.cgi?id=196803
x_refsource_CONFIRM
http://www.ubuntu.com/usn/usn-545-1
vendor-advisory
x_refsource_UBUNTU
http://secunia.com/advisories/27300
third-party-advisory
x_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=371221
x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/483370/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/27702
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/27783
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/483368/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/secunia_research/2007-79/advisory/
x_refsource_MISC
http://secunia.com/advisories/27631
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/27340
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/bid/26365
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://secunia.com/secunia_research/2007-78/advisory/
Resource:
x_refsource_MISC
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450695
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00411.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/38317
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.vupen.com/english/advisories/2007/3771
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/28101
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://security.gentoo.org/glsa/glsa-200711-27.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.vupen.com/english/advisories/2007/3770
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.debian.org/security/2007/dsa-1432
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://bugs.gentoo.org/show_bug.cgi?id=196803
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.ubuntu.com/usn/usn-545-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://secunia.com/advisories/27300
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=371221
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/archive/1/483370/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/27702
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/27783
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/483368/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/secunia_research/2007-79/advisory/
Resource:
x_refsource_MISC
Hyperlink: http://secunia.com/advisories/27631
Resource:
third-party-advisory
x_refsource_SECUNIA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/27340
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/bid/26365
vdb-entry
x_refsource_BID
x_transferred
http://secunia.com/secunia_research/2007-78/advisory/
x_refsource_MISC
x_transferred
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450695
x_refsource_CONFIRM
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00411.html
vendor-advisory
x_refsource_FEDORA
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/38317
vdb-entry
x_refsource_XF
x_transferred
http://www.vupen.com/english/advisories/2007/3771
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/28101
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://security.gentoo.org/glsa/glsa-200711-27.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.vupen.com/english/advisories/2007/3770
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.debian.org/security/2007/dsa-1432
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://bugs.gentoo.org/show_bug.cgi?id=196803
x_refsource_CONFIRM
x_transferred
http://www.ubuntu.com/usn/usn-545-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://secunia.com/advisories/27300
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=371221
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/archive/1/483370/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/27702
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/27783
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/483368/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/secunia_research/2007-79/advisory/
x_refsource_MISC
x_transferred
http://secunia.com/advisories/27631
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/27340
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/26365
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://secunia.com/secunia_research/2007-78/advisory/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450695
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00411.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/38317
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/3771
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/28101
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200711-27.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/3770
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.debian.org/security/2007/dsa-1432
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://bugs.gentoo.org/show_bug.cgi?id=196803
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-545-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://secunia.com/advisories/27300
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=371221
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/483370/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/27702
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/27783
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/483368/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/secunia_research/2007-79/advisory/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://secunia.com/advisories/27631
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Details not found