Vulnerability Name:

CVE-2005-2922 (CCN-25409)

Assigned:2005-12-31
Published:2005-12-31
Updated:2017-10-11
Summary:Heap-based buffer overflow in the embedded player in multiple RealNetworks products and versions including RealPlayer 10.x, RealOne Player, and Helix Player allows remote malicious servers to cause a denial of service (crash) and possibly execute arbitrary code via a chunked Transfer-Encoding HTTP response in which either (1) the chunk header length is specified as -1, (2) the chunk header with a length that is less than the actual amount of sent data, or (3) a missing chunk header.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2005-2922

Source: CCN
Type: RHSA-2005-762
RealPlayer security update

Source: CCN
Type: RHSA-2005-788
HelixPlayer security update

Source: CCN
Type: SA19358
RealNetworks Products Multiple Buffer Overflow Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
19358

Source: SECUNIA
Type: Patch, Vendor Advisory
19365

Source: CCN
Type: SECTRACK ID: 1015808
RealPlayer Heap Overflow in Embedded Player May Let Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1015808

Source: CCN
Type: RealNetworks Customer Support - Real Security Updates Web page
RealNetworks Releases Product Updates - 03162006

Source: CCN
Type: US-CERT VU#172489
RealNetworks products fail to properly handle chunked data

Source: CERT-VN
Type: Patch, Third Party Advisory, US Government Resource
VU#172489

Source: SUSE
Type: Patch, Vendor Advisory
SUSE-SA:2006:018

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2005:762

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2005:788

Source: BID
Type: Exploit
17202

Source: CCN
Type: BID-17202
RealNetworks Multiple Products Multiple Buffer Overflow Vulnerabilities

Source: CONFIRM
Type: Patch
http://www.service.real.com/realplayer/security/03162006_player/en/

Source: VUPEN
Type: Vendor Advisory
ADV-2006-1057

Source: CCN
Type: Internet Security Systems Protection Alert 03/28/06
RealNetworks RealPlayer chunked Transfer-Encoding buffer overflow

Source: XF
Type: UNKNOWN
realnetworks-chunked-transferencoding-bo(25409)

Source: XF
Type: UNKNOWN
realnetworks-chunked-transferencoding-bo(25409)

Source: CCN
Type: iDEFENSE Security Advisory: 03.23.06
RealNetworks RealPlayer and Helix Player Invalid Chunk Size Heap Overflow Vulnerability

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:11444

Source: SUSE
Type: SUSE-SA:2006:018
RealPlayer security problems

Vulnerable Configuration:Configuration 1:
  • cpe:/a:realnetworks:helix_player:10.0:*:linux:*:*:*:*:*
  • OR cpe:/a:realnetworks:helix_player:10.0.1:*:linux:*:*:*:*:*
  • OR cpe:/a:realnetworks:helix_player:10.0.2:*:linux:*:*:*:*:*
  • OR cpe:/a:realnetworks:helix_player:10.0.3:*:linux:*:*:*:*:*
  • OR cpe:/a:realnetworks:helix_player:10.0.4:*:linux:*:*:*:*:*
  • OR cpe:/a:realnetworks:helix_player:10.0.5:*:linux:*:*:*:*:*
  • OR cpe:/a:realnetworks:helix_player:10.0.6:*:linux:*:*:*:*:*
  • OR cpe:/a:realnetworks:realone_player:*:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realone_player:0.288:*:mac_os_x:*:*:*:*:*
  • OR cpe:/a:realnetworks:realone_player:0.297:*:mac_os_x:*:*:*:*:*
  • OR cpe:/a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:*:*:enterprise:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:8.0:*:win32:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.0.0.305:*:mac_os:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.0.0.331:*:mac_os:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.0.1:*:linux:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.0.2:*:linux:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.0.3:*:linux:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.0.4:*:linux:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.0.5:*:linux:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.0.6:*:linux:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.5_6.0.12.1040:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.5_6.0.12.1053:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.5_6.0.12.1056:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.5_6.0.12.1059:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.5_6.0.12.1069:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.5_6.0.12.1235:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:rhapsody:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:rhapsody:3.0_build_0.815:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20052922
    V
    CVE-2005-2922
    2015-11-16
    oval:org.mitre.oval:def:11444
    V
    Heap-based buffer overflow in the embedded player in multiple RealNetworks products and versions including RealPlayer 10.x, RealOne Player, and Helix Player allows remote malicious servers to cause a denial of service (crash) and possibly execute arbitrary code via a chunked Transfer-Encoding HTTP response in which either (1) the chunk header length is specified as -1, (2) the chunk header with a length that is less than the actual amount of sent data, or (3) a missing chunk header.
    2013-04-29
    oval:com.redhat.rhsa:def:20050788
    P
    RHSA-2005:788: HelixPlayer security update (Critical)
    2005-09-27
    BACK
    realnetworks helix player 10.0
    realnetworks helix player 10.0.1
    realnetworks helix player 10.0.2
    realnetworks helix player 10.0.3
    realnetworks helix player 10.0.4
    realnetworks helix player 10.0.5
    realnetworks helix player 10.0.6
    realnetworks realone player *
    realnetworks realone player 0.288
    realnetworks realone player 0.297
    realnetworks realone player 1.0
    realnetworks realone player 2.0
    realnetworks realplayer *
    realnetworks realplayer 8.0
    realnetworks realplayer 10.0
    realnetworks realplayer 10.0.0.305
    realnetworks realplayer 10.0.0.331
    realnetworks realplayer 10.0.1
    realnetworks realplayer 10.0.2
    realnetworks realplayer 10.0.3
    realnetworks realplayer 10.0.4
    realnetworks realplayer 10.0.5
    realnetworks realplayer 10.0.6
    realnetworks realplayer 10.5
    realnetworks realplayer 10.5_6.0.12.1040
    realnetworks realplayer 10.5_6.0.12.1053
    realnetworks realplayer 10.5_6.0.12.1056
    realnetworks realplayer 10.5_6.0.12.1059
    realnetworks realplayer 10.5_6.0.12.1069
    realnetworks realplayer 10.5_6.0.12.1235
    realnetworks rhapsody 3.0
    realnetworks rhapsody 3.0_build_0.815