[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96078

 
 

909

 
 

78009

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2007-3410

Date: (C)2007-06-26   (M)2017-10-12
 
CVSS Score: 9.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Stack-based buffer overflow in the SmilTimeValue::parseWallClockValue function in smlprstime.cpp in RealNetworks RealPlayer 10, 10.1, and possibly 10.5, RealOne Player, RealPlayer Enterprise, and Helix Player 10.5-GOLD and 10.0.5 through 10.0.8, allows remote attackers to execute arbitrary code via an SMIL (SMIL2) file with a long wallclock value.

Reference:
SECTRACK-1018297
SECTRACK-1018299
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=547
http://www.attrition.org/pipermail/vim/2007-October/001841.html
BID-24658
SECUNIA-25819
SECUNIA-25859
SECUNIA-26463
SECUNIA-26828
SECUNIA-27361
OSVDB-37374
OSVDB-38342
ADV-2007-2339
ADV-2007-3628
GLSA-200709-05
IAVM:2007-B-0035
RHSA-2007:0605
RHSA-2007:0841
VU#770904
http://service.real.com/realplayer/security/10252007_player/en/
realplayer-smiltime-wallclockvalue-bo(35088)

CPE    3
cpe:/a:realnetworks:realone_player
cpe:/a:realnetworks:realplayer:10.5
cpe:/a:realnetworks:realplayer:10.0
CWE    1
CWE-119
OVAL    2
oval:org.secpod.oval:def:14056
oval:org.secpod.oval:def:14049

© 2013 SecPod Technologies