VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-4378
realplayer, realplayer_sp: The drv2.dll (aka RV20 decompression) module in Rea...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4378

Original

The drv2.dll (aka RV20 decompression) module in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, RealPlayer Enterprise 2.1.2 and 2.1.3, and Linux RealPlayer 11.0.2.1744 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted value of an unspecified length field in an RV20 video stream.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-12-14
Source Information Category:
Advisory, Alert
Last Updated:
2010-12-14




Affected Product Tags
cpe:/a:realnetworks:realplayer:11.0
cpe:/a:realnetworks:realplayer:11.0.1
cpe:/a:realnetworks:realplayer:11.0.2
cpe:/a:realnetworks:realplayer:11.0.2.1744
cpe:/a:realnetworks:realplayer:11.0.3
cpe:/a:realnetworks:realplayer:11.0.4
cpe:/a:realnetworks:realplayer:11.0.5
cpe:/a:realnetworks:realplayer:11.1
cpe:/a:realnetworks:realplayer:2.1.2::enterprise
cpe:/a:realnetworks:realplayer:2.1.3::enterprise
cpe:/a:realnetworks:realplayer_sp:1.0.0
cpe:/a:realnetworks:realplayer_sp:1.0.1
cpe:/a:realnetworks:realplayer_sp:1.0.2
cpe:/a:realnetworks:realplayer_sp:1.0.5
cpe:/a:realnetworks:realplayer_sp:1.1
cpe:/a:realnetworks:realplayer_sp:1.1.1
cpe:/a:realnetworks:realplayer_sp:1.1.2
cpe:/a:realnetworks:realplayer_sp:1.1.3
cpe:/a:realnetworks:realplayer_sp:1.1.4
cpe:/a:realnetworks:realplayer_sp:1.1.5
cpe:/o:linux:linux_kernel
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
X Medium [?]
Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

[Availability Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

Alternatives




References
CONFIRM http://service.real.com/realplayer/security/12102010_player/en/




MISC http://www.zerodayinitiative.com/advisories/ZDI-10-274




Vulnerability Type Buffer Errors (CWE-119)





Copyright © 2010 JPCERT/CC All Rights Reserved.