Vulnerability Name:

CVE-2005-2710 (CCN-22465)

Assigned:2005-09-26
Published:2005-09-26
Updated:2017-10-11
Summary:Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote attackers to execute arbitrary code via the (1) image handle or (2) timeformat attribute in a RealPix (.rp) or RealText (.rt) file.
CVSS v3 Severity:5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
4.2 Medium (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
4.2 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Full-Disclosure Mailing List, Fri Sep 30 2005 - 13:23:45 CDT
iDEFENSE Security Advisory 09.30.05: RealNetworks RealPlayer/HelixPlayer RealPix Format String Vulnerability

Source: CONFIRM
Type: Vendor Advisory
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168078

Source: MITRE
Type: CNA
CVE-2005-2710

Source: BUGTRAQ
Type: UNKNOWN
20050926 RealPlayer && HelixPlayer Remote Format String Exploit

Source: FULLDISC
Type: UNKNOWN
20050926 RealPlayer && HelixPlayer Remote Format String

Source: CCN
Type: RHSA-2005-762
RealPlayer security update

Source: CCN
Type: RHSA-2005-788
HelixPlayer security update

Source: CCN
Type: SA16954
Helix Player Error Message Format String Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
16954

Source: CCN
Type: SA16961
RealPlayer Error Message Format String Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
16961

Source: SECUNIA
Type: UNKNOWN
16981

Source: SECUNIA
Type: UNKNOWN
17116

Source: SECUNIA
Type: UNKNOWN
17127

Source: SREASON
Type: UNKNOWN
27

Source: SREASON
Type: UNKNOWN
41

Source: CCN
Type: RealPlayer Customer Support Web page
RealNetworks, Inc. Releases Update to Address Security Vulnerabilities

Source: DEBIAN
Type: Vendor Advisory
DSA-826

Source: DEBIAN
Type: DSA-826
helix-player -- multiple vulnerabilities

Source: CCN
Type: GLSA-200510-07
RealPlayer, Helix Player: Format string vulnerability

Source: GENTOO
Type: UNKNOWN
GLSA-200510-07

Source: IDEFENSE
Type: Vendor Advisory
20050930 RealNetworks RealPlayer/HelixPlayer RealPix Format String Vulnerability

Source: CCN
Type: US-CERT VU#361181
Helix Player format string vulnerability

Source: CERT-VN
Type: Third Party Advisory, US Government Resource
VU#361181

Source: SUSE
Type: UNKNOWN
SUSE-SA:2005:059

Source: MISC
Type: Vendor Advisory
http://www.open-security.org/advisories/13

Source: REDHAT
Type: UNKNOWN
RHSA-2005:762

Source: REDHAT
Type: Vendor Advisory
RHSA-2005:788

Source: XF
Type: UNKNOWN
realplayer-helix-realpix-format-string(22465)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:11015

Source: CCN
Type: Helix Player Community Download Web page
Player Downloads

Source: SUSE
Type: SUSE-SA:2005:059
RealPlayer: remote code execution

Vulnerable Configuration:Configuration 1:
  • cpe:/a:realnetworks:helix_player:*:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20052710
    V
    CVE-2005-2710
    2015-11-16
    oval:org.mitre.oval:def:11015
    V
    Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote attackers to execute arbitrary code via the (1) image handle or (2) timeformat attribute in a RealPix (.rp) or RealText (.rt) file.
    2013-04-29
    oval:org.debian:def:826
    V
    multiple vulnerabilities
    2005-09-29
    oval:com.redhat.rhsa:def:20050788
    P
    RHSA-2005:788: HelixPlayer security update (Critical)
    2005-09-27
    BACK
    realnetworks helix player *
    realnetworks realplayer 10.0