VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-4377
realplayer, realplayer_sp: Heap-based buffer overflow in RealNetworks RealPlay...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4377

Original

Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, Mac RealPlayer 11.0 through 12.0.0.1444, and Linux RealPlayer 11.0.2.1744 allows remote attackers to execute arbitrary code by specifying many subbands in cook audio codec information in a Real Audio file.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-12-14
Source Information Category:
Advisory, Alert
Last Updated:
2010-12-14




Affected Product Tags
cpe:/a:realnetworks:realplayer:11.0
cpe:/a:realnetworks:realplayer:11.0.1
cpe:/a:realnetworks:realplayer:11.0.2
cpe:/a:realnetworks:realplayer:11.0.2.1744
cpe:/a:realnetworks:realplayer:11.0.3
cpe:/a:realnetworks:realplayer:11.0.4
cpe:/a:realnetworks:realplayer:11.0.5
cpe:/a:realnetworks:realplayer:11.1
cpe:/a:realnetworks:realplayer:12.0.0.1444
cpe:/a:realnetworks:realplayer_sp:1.0.0
cpe:/a:realnetworks:realplayer_sp:1.0.1
cpe:/a:realnetworks:realplayer_sp:1.0.2
cpe:/a:realnetworks:realplayer_sp:1.0.5
cpe:/a:realnetworks:realplayer_sp:1.1
cpe:/a:realnetworks:realplayer_sp:1.1.1
cpe:/a:realnetworks:realplayer_sp:1.1.2
cpe:/a:realnetworks:realplayer_sp:1.1.3
cpe:/a:realnetworks:realplayer_sp:1.1.4
cpe:/a:realnetworks:realplayer_sp:1.1.5
cpe:/o:apple:mac_os_x
cpe:/o:linux:linux_kernel
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
X Medium [?]
Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

[Availability Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

Alternatives




References
CONFIRM http://service.real.com/realplayer/security/12102010_player/en/




MISC http://www.zerodayinitiative.com/advisories/ZDI-10-272




Vulnerability Type Buffer Errors (CWE-119)





Copyright © 2010 JPCERT/CC All Rights Reserved.