VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-4392
realplayer, realplayer_sp: Heap-based buffer overflow in RealNetworks RealPlay...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4392

Original

Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, RealPlayer Enterprise 2.1.2 and 2.1.3, and Linux RealPlayer 11.0.2.1744 allows remote attackers to execute arbitrary code via crafted ImageMap data in a RealMedia file, related to certain improper integer calculations.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-12-14
Source Information Category:
Advisory, Alert
Last Updated:
2010-12-15




Affected Product Tags
cpe:/a:realnetworks:realplayer:11.0
cpe:/a:realnetworks:realplayer:11.0.1
cpe:/a:realnetworks:realplayer:11.0.2
cpe:/a:realnetworks:realplayer:11.0.2.1744
cpe:/a:realnetworks:realplayer:11.0.3
cpe:/a:realnetworks:realplayer:11.0.4
cpe:/a:realnetworks:realplayer:11.0.5
cpe:/a:realnetworks:realplayer:11.1
cpe:/a:realnetworks:realplayer:2.1.2::enterprise
cpe:/a:realnetworks:realplayer:2.1.3::enterprise
cpe:/a:realnetworks:realplayer_sp:1.0.0
cpe:/a:realnetworks:realplayer_sp:1.0.1
cpe:/a:realnetworks:realplayer_sp:1.0.2
cpe:/a:realnetworks:realplayer_sp:1.0.5
cpe:/a:realnetworks:realplayer_sp:1.1
cpe:/a:realnetworks:realplayer_sp:1.1.1
cpe:/a:realnetworks:realplayer_sp:1.1.2
cpe:/a:realnetworks:realplayer_sp:1.1.3
cpe:/a:realnetworks:realplayer_sp:1.1.4
cpe:/a:realnetworks:realplayer_sp:1.1.5
cpe:/o:linux:linux_kernel
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
X Medium [?]
Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

[Availability Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

Alternatives




References
CONFIRM http://service.real.com/realplayer/security/12102010_player/en/




MISC http://www.zerodayinitiative.com/advisories/ZDI-10-280




Vulnerability Type Buffer Errors (CWE-119)





Copyright © 2010 JPCERT/CC All Rights Reserved.