Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2009-0376

Overview

Vulnerability Score 9.3 9.3
CVE Id CVE-2009-0376
Last Modified 28 Jan 2010 01:53:57
Published 08 Feb 2009 04:30:09
Confidentiality Impact COMPLETE COMPLETE
Integrity Impact COMPLETE COMPLETE
Availability Impact COMPLETE COMPLETE
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2009-0376

Summary

Heap-based buffer overflow in a DLL file in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows remote attackers to execute arbitrary code via a crafted Internet Video Recording (IVR) file with a modified field that controls an unspecified structure length and triggers heap corruption, related to use of RealPlayer through a Windows Explorer plugin.

Vulnerable Systems

Application

  • Realnetworks Realplayer 11


References

XF - realplayer-ivr-code-execution(48568)

MISC - http://www.zerodayinitiative.com/advisories/ZDI-10-009/

VUPEN - ADV-2010-0178

BID - 33652

BUGTRAQ - 20100121 ZDI-10-009: RealNetworks RealPlayer IVR Format Remote Code Execution Vulnerability

BUGTRAQ - 20090206 RealNetworks RealPlayer IVR File Processing Multiple Code Execute Vulnerabilities

MISC - http://www.fortiguardcenter.com/advisory/FGA-2009-04.html

CONFIRM - http://service.real.com/realplayer/security/01192010_player/en/

SECUNIA - 38218

SECUNIA - 33810


Last Updated: 27 May 2016 10:50:14