| Vulnerability Name: | CVE-2003-0725 (CCN-13004) | ||||||||
| Assigned: | 2003-08-22 | ||||||||
| Published: | 2003-08-22 | ||||||||
| Updated: | 2008-09-05 | ||||||||
| Summary: | Buffer overflow in the RTSP protocol parser for the View Source plug-in (vsrcplin.so or vsrcplin3260.dll) for RealNetworks Helix Universal Server 9 and RealSystem Server 8, 7 and RealServer G2 allows remote attackers to execute arbitrary code. | ||||||||
| CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: VULNWATCH Type: Vendor Advisory 20030825 New Bug in RealServer Source: MITRE Type: CNA CVE-2003-0725 Source: MISC Type: UNKNOWN http://lists.immunitysec.com/pipermail/dailydave/2003-August/000030.html Source: CCN Type: CIAC Information Bulletin N-152 Real Networks Streaming Server Vulnerability Source: CCN Type: US-CERT VU#934932 RealNetworks media server RTSP protocol parser buffer overflow Source: CERT-VN Type: Third Party Advisory, US Government Resource VU#934932 Source: CCN Type: OSVDB ID: 11772 RealNetworks Helix Universal Server View Source Plug-in RTSP Parser Overflow Source: BID Type: Exploit, Patch, Vendor Advisory 8476 Source: CCN Type: BID-8476 Real Networks Helix Universal Server Remote Buffer Overflow Vulnerability Source: CCN Type: RealNetworks Security Updates August 22, 2003 Server Exploit Vulnerability Source: CONFIRM Type: UNKNOWN http://www.service.real.com/help/faq/security/rootexploit082203.html Source: CCN Type: RealNetworks Customer Support Web site RealNetworks Support: Server Exploit Fix Source: XF Type: UNKNOWN helix-view-code-execution(13004) | ||||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||