Vulnerability Name:

CVE-2005-2630 (CCN-23025)

Assigned:2005-11-10
Published:2005-11-10
Updated:2017-07-11
Summary:Heap-based buffer overflow in DUNZIP32.DLL for RealPlayer 8, 10, and 10.5 and RealOne Player 1 and 2 allows remote attackers to execute arbitrary code via a crafted RealPlayer Skin (RJS) file, a different vulnerability than CVE-2004-1094.
CVSS v3 Severity:5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2005-2630

Source: EEYE
Type: UNKNOWN
EEYEB20050701

Source: CCN
Type: SA17514
RealPlayer/RealOne/HelixPlayer "rm" and "rjs" File Handling Buffer Overflow

Source: SECUNIA
Type: Patch, Vendor Advisory
17514

Source: SECUNIA
Type: UNKNOWN
17860

Source: SREASON
Type: UNKNOWN
170

Source: CCN
Type: SECTRACK ID: 1015184
RealPlayer Enterprise Buffer Overflows in Processing .rm Files and Skin Files Lets Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1015184

Source: CCN
Type: SECTRACK ID: 1015185
RealPlayer/RealOne Player Buffer Overflows in Processing .rm Files and Skin Files Lets Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1015185

Source: CCN
Type: RealPlayer Customer Support Web page
RealNetworks, Inc. Releases Update to Address Security Vulnerabilities

Source: CONFIRM
Type: Patch
http://service.real.com/help/faq/security/051110_player/EN/

Source: CCN
Type: eEye Digital Security Advisory AD20051110b
RealPlayer Zipped Skin File Buffer Overflow II

Source: EEYE
Type: Patch, Vendor Advisory
AD20051110b

Source: OSVDB
Type: UNKNOWN
18827

Source: CCN
Type: OSVDB ID: 18827
RealPlayer .rjs Zipped Skin File Processing DUNZIP32.DLL Overflow

Source: BID
Type: UNKNOWN
15382

Source: CCN
Type: BID-15382
RealNetworks RealPlayer DUNZIP32.DLL Heap Overflow Vulnerability

Source: XF
Type: UNKNOWN
realplayer-rjs-zip-bo(23025)

Source: XF
Type: UNKNOWN
realplayer-rjs-zip-bo(23025)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:*:*:enterprise:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:8.0:*:win32:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.0:*:linux:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.0:*:mac_os_x:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.5_6.0.12.1040:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.5_6.0.12.1053:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.5_6.0.12.1056:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.5_6.0.12.1059:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.5_6.0.12.1069:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.5_6.0.12.1235:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    realnetworks realone player 1.0
    realnetworks realone player 2.0
    realnetworks realplayer *
    realnetworks realplayer 8.0
    realnetworks realplayer 10.0
    realnetworks realplayer 10.0
    realnetworks realplayer 10.0
    realnetworks realplayer 10.5
    realnetworks realplayer 10.5_6.0.12.1040
    realnetworks realplayer 10.5_6.0.12.1053
    realnetworks realplayer 10.5_6.0.12.1056
    realnetworks realplayer 10.5_6.0.12.1059
    realnetworks realplayer 10.5_6.0.12.1069
    realnetworks realplayer 10.5_6.0.12.1235