Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2005-2630

Overview

Vulnerability Score 5.1 5.1
CVE Id CVE-2005-2630
Last Modified 07 Mar 2011 09:24:47
Published 18 Nov 2005 06:03:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity HIGH
Authentication NONE

CVE-2005-2630

Summary

Heap-based buffer overflow in DUNZIP32.DLL for RealPlayer 8, 10, and 10.5 and RealOne Player 1 and 2 allows remote attackers to execute arbitrary code via a crafted RealPlayer Skin (RJS) file, a different vulnerability than CVE-2004-1094.

Vulnerable Systems

Application

  • Realnetworks Realone Player 1.0

  • Realnetworks Realone Player 2.0

  • Realnetworks Realplayer

  • Realnetworks Realplayer 10.0

  • Realnetworks Realplayer 10.5

  • Realnetworks Realplayer 10.5 6.0.12.1040

  • Realnetworks Realplayer 10.5 6.0.12.1053

  • Realnetworks Realplayer 10.5 6.0.12.1056

  • Realnetworks Realplayer 10.5 6.0.12.1059

  • Realnetworks Realplayer 10.5 6.0.12.1069

  • Realnetworks Realplayer 10.5 6.0.12.1235

  • Realnetworks Realplayer 8.0


References

EEYE - AD20051110b

CONFIRM - http://service.real.com/help/faq/security/051110_player/EN/

SECUNIA - 17514

EEYE - EEYEB20050701

XF - realplayer-rjs-zip-bo(23025)

BID - 15382

OSVDB - 18827

SECTRACK - 1015185

SECTRACK - 1015184

SECUNIA - 17860

SREASON - 170


Last Updated: 27 May 2016 10:40:34