Vulnerability Name:

CVE-2002-0207 (CCN-7839)

Assigned:2002-01-05
Published:2002-01-05
Updated:2017-07-11
Summary:Buffer overflow in Real Networks RealPlayer 8.0 and earlier allows remote attackers to execute arbitrary code via a header length value that exceeds the actual length of the header.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: BugTraq Mailing List, Fri Jan 25 2002 - 01:04:08 CST
Potential RealPlayer 8 Vulnerability

Source: CCN
Type: BugTraq Mailing List, Thu Jan 24 2002 - 21:17:41 CST
RealPlayer Buffer Overflow [Sentinel Chicken Networks Security Advisory #01]

Source: CCN
Type: Vuln-Dev Mailing List, Sat Jan 05 2002 - 23:20:33 CST
RealPlayer Buffer Problem

Source: VULN-DEV
Type: Vendor Advisory
20020105 RealPlayer Buffer Problem

Source: MITRE
Type: CNA
CVE-2002-0207

Source: BUGTRAQ
Type: Not Applicable, Third Party Advisory, VDB Entry
20020124 Potential RealPlayer 8 Vulnerability

Source: BUGTRAQ
Type: Not Applicable, Third Party Advisory, VDB Entry
20020124 RealPlayer Buffer Overflow [Sentinel Chicken Networks Security Advisory #01]

Source: MISC
Type: Vendor Advisory
http://sentinelchicken.com/advisories/realplayer/

Source: XF
Type: Broken Link
realplayer-file-header-bo(7839)

Source: CCN
Type: OSVDB ID: 5333
RealPlayer Header Length Overflow

Source: BID
Type: Third Party Advisory, VDB Entry
3809

Source: CCN
Type: BID-3809
Real Media RealPlayer Media File Buffer Overflow Vulnerability

Source: CCN
Type: Sentinel Chicken Networks Security Advisory #01
RealPlayer¤ 8 Buffer Overflow

Source: CCN
Type: RealPlayer Frequently Asked Questions January 25, 2002
Potential exploit, commonly known as a 'buffer overrun' could potentially allow arbitrary code to be run with unauthorized access.

Source: XF
Type: UNKNOWN
realplayer-file-header-bo(7839)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:realnetworks:realone_player:*:*:*:*:*:*:*:* (Version <= 8.0)
  • OR cpe:/a:realnetworks:realplayer_intranet:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer_intranet:*:*:*:*:*:*:*:* (Version <= 8.0)

  • * Denotes that component is vulnerable
    BACK
    realnetworks realone player *
    realnetworks realplayer intranet 7.0
    realnetworks realplayer intranet *