Vulnerability CVE-2005-2710


Published: 2005-09-27   Modified: 2012-02-12

Description:
Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote attackers to execute arbitrary code via the (1) image handle or (2) timeformat attribute in a RealPix (.rp) or RealText (.rt) file.

See advisories in our WLB2 database:
Topic
Author
Date
High
RealPlayer && HelixPlayer Remote Format String
c0ntexb
27.09.2005
High
RealNetworks RealPlayer/HelixPlayer RealPix Format String Vulnerability
iDEFENSE Labs
01.10.2005

CVSS2 => (AV:N/AC:H/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.1/10
6.4/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Realnetworks -> Helix player 
Realnetworks -> Realplayer 

 References:
http://www.kb.cert.org/vuls/id/361181
http://www.redhat.com/support/errata/RHSA-2005-788.html
http://www.open-security.org/advisories/13
http://www.idefense.com/application/poi/display?id=311&type=vulnerabilities
http://www.gentoo.org/security/en/glsa/glsa-200510-07.xml
http://www.debian.org/security/2005/dsa-826
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11015
http://marc.theaimsgroup.com/?l=full-disclosure&m=112775929608219&w=2
http://marc.theaimsgroup.com/?l=bugtraq&m=112785544325326&w=2
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168078
http://www.redhat.com/support/errata/RHSA-2005-762.html
http://www.novell.com/linux/security/advisories/2005_59_RealPlayer.html
http://securityreason.com/securityalert/41
http://securityreason.com/securityalert/27
http://secunia.com/advisories/17127
http://secunia.com/advisories/17116
http://secunia.com/advisories/16981
http://secunia.com/advisories/16961
http://secunia.com/advisories/16954

Copyright 2023, cxsecurity.com

 

Back to Top