Multiple stack-based buffer overflows in the RTF import feature in AbiWord before 2.2.11 allow user-assisted attackers to execute arbitrary code via an RTF file with long identifiers, which are not properly handled in the (1) ParseLevelText, (2) getCharsInsideBrace, (3) HandleLists, (4) or (5) HandleAbiLists functions in ie_imp_RTF.cpp, a different vulnerability than CVE-2005-2964.
http://www.vupen.com/english/advisories/2005/2086
http://www.securityfocus.com/bid/15096
http://www.mail-archive.com/debian-bugs-rc%40lists.debian.org/msg28251.html
http://www.gentoo.org/security/en/glsa/glsa-200510-17.xml
http://www.debian.org/security/2005/dsa-894
http://www.abisource.com/changelogs/2.2.11.phtml
http://secunia.com/advisories/17551
http://secunia.com/advisories/17264
http://secunia.com/advisories/17213