[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

95906

 
 

909

 
 

77986

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2007-2264

Date: (C)2007-10-31   (M)2017-10-12
 
CVSS Score: 9.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Heap-based buffer overflow in RealNetworks RealPlayer 8, 10, 10.1, and possibly 10.5; RealOne Player 1 and 2; and RealPlayer Enterprise allows remote attackers to execute arbitrary code via a RAM (.ra or .ram) file with a large size value in the RA header.

Reference:
SECTRACK-1018866
http://www.attrition.org/pipermail/vim/2007-October/001841.html
http://www.securityfocus.com/archive/1/archive/1/483113/100/0/threaded
BID-26214
SECUNIA-27361
ADV-2007-3628
IAVM:2007-B-0035
http://service.real.com/realplayer/security/10252007_player/en/
http://www.zerodayinitiative.com/advisories/ZDI-07-063.html
realplayer-ram-bo(37437)

CWE    1
CWE-119
OVAL    2
oval:org.secpod.oval:def:14048
oval:org.secpod.oval:def:14054

© 2013 SecPod Technologies