Vulnerability Name: | CVE-2005-2630 (CCN-23025) | ||||||||
Assigned: | 2005-11-10 | ||||||||
Published: | 2005-11-10 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | Heap-based buffer overflow in DUNZIP32.DLL for RealPlayer 8, 10, and 10.5 and RealOne Player 1 and 2 allows remote attackers to execute arbitrary code via a crafted RealPlayer Skin (RJS) file, a different vulnerability than CVE-2004-1094. | ||||||||
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2005-2630 Source: EEYE Type: UNKNOWN EEYEB20050701 Source: CCN Type: SA17514 RealPlayer/RealOne/HelixPlayer "rm" and "rjs" File Handling Buffer Overflow Source: SECUNIA Type: Patch, Vendor Advisory 17514 Source: SECUNIA Type: UNKNOWN 17860 Source: SREASON Type: UNKNOWN 170 Source: CCN Type: SECTRACK ID: 1015184 RealPlayer Enterprise Buffer Overflows in Processing .rm Files and Skin Files Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1015184 Source: CCN Type: SECTRACK ID: 1015185 RealPlayer/RealOne Player Buffer Overflows in Processing .rm Files and Skin Files Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1015185 Source: CCN Type: RealPlayer Customer Support Web page RealNetworks, Inc. Releases Update to Address Security Vulnerabilities Source: CONFIRM Type: Patch http://service.real.com/help/faq/security/051110_player/EN/ Source: CCN Type: eEye Digital Security Advisory AD20051110b RealPlayer Zipped Skin File Buffer Overflow II Source: EEYE Type: Patch, Vendor Advisory AD20051110b Source: OSVDB Type: UNKNOWN 18827 Source: CCN Type: OSVDB ID: 18827 RealPlayer .rjs Zipped Skin File Processing DUNZIP32.DLL Overflow Source: BID Type: UNKNOWN 15382 Source: CCN Type: BID-15382 RealNetworks RealPlayer DUNZIP32.DLL Heap Overflow Vulnerability Source: XF Type: UNKNOWN realplayer-rjs-zip-bo(23025) Source: XF Type: UNKNOWN realplayer-rjs-zip-bo(23025) | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
BACK |