Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.902109
Kategorie:Buffer overflow
Titel:RealNetworks RealPlayer SMIL file BOF Vulnerability (Linux)
Zusammenfassung:This host is installed with RealPlayer which is prone to Buffer; overflow vulnerability.
Beschreibung:Summary:
This host is installed with RealPlayer which is prone to Buffer
overflow vulnerability.

Vulnerability Insight:
The buffer overflow error exists when processing a malformed 'SMIL file'.

Vulnerability Impact:
Successful exploitation will let the attacker execute arbitrary codes within
the context of the application and can cause heap overflow or cause remote
code execution.

Affected Software/OS:
RealPlayer versions 10.x and 11.0.0 on Linux platforms.

Solution:
Upgrade to RealPlayer version 11.0.5 or later.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: BugTraq ID: 37880
Common Vulnerability Exposure (CVE) ID: CVE-2009-4257
http://www.securityfocus.com/bid/37880
Bugtraq: 20100121 ZDI-10-007: RealNetworks RealPlayer SMIL getAtom Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/509105/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-10-007/
http://lists.helixcommunity.org/pipermail/datatype-cvs/2008-September/008678.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11110
http://www.redhat.com/support/errata/RHSA-2010-0094.html
http://securitytracker.com/id?1023489
http://secunia.com/advisories/38218
http://secunia.com/advisories/38450
http://www.vupen.com/english/advisories/2010/0178
XForce ISS Database: realnetworks-realplayer-smil-bo(55798)
https://exchange.xforce.ibmcloud.com/vulnerabilities/55798
CopyrightCopyright (C) 2010 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.