--%> SecPod SCAP Repo, a repository of SCAP Content (CVE, CCE, CPE, CWE, OVAL and XCCDF)
[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2009-0376

Date: (C)2009-02-08   (M)2017-08-08
 
CVSS Score: 9.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Heap-based buffer overflow in a DLL file in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows remote attackers to execute arbitrary code via a crafted Internet Video Recording (IVR) file with a modified field that controls an unspecified structure length and triggers heap corruption, related to use of RealPlayer through a Windows Explorer plugin.

Reference:
http://www.securityfocus.com/archive/1/archive/1/500722/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/509097/100/0/threaded
BID-33652
SECUNIA-33810
SECUNIA-38218
ADV-2010-0178
http://service.real.com/realplayer/security/01192010_player/en/
http://www.fortiguardcenter.com/advisory/FGA-2009-04.html
http://www.zerodayinitiative.com/advisories/ZDI-10-009/
realplayer-ivr-code-execution(48568)

CWE    1
CWE-119

© 2013 SecPod Technologies