Vulnerability Name: | CVE-2006-0323 (CCN-25408) | ||||||||
Assigned: | 2006-03-22 | ||||||||
Published: | 2006-03-22 | ||||||||
Updated: | 2018-10-19 | ||||||||
Summary: | Buffer overflow in swfformat.dll in multiple RealNetworks products and versions including RealPlayer 10.x, RealOne Player, Rhapsody 3, and Helix Player allows remote attackers to execute arbitrary code via a crafted SWF (Flash) file with (1) a size value that is less than the actual size, or (2) other unspecified manipulations. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-119 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: Full-Disclosure Mailing List, Tue Apr 11 2006 - 06:47:34 CDT Realplayer .SWF Multiple Remote Memory Corruption Vulnerabilities Source: MITRE Type: CNA CVE-2006-0323 Source: CCN Type: RHSA-2006-0257 RealPlayer security update Source: CCN Type: SA19358 RealNetworks Products Multiple Buffer Overflow Vulnerabilities Source: SECUNIA Type: Vendor Advisory 19358 Source: SECUNIA Type: Patch, Vendor Advisory 19362 Source: SECUNIA Type: Patch, Vendor Advisory 19365 Source: SECUNIA Type: Vendor Advisory 19390 Source: SREASON Type: UNKNOWN 690 Source: CCN Type: SECTRACK ID: 1015806 RealPlayer Buffer Overflow in Processing SWF Flash Files Lets Remote Cause Arbitrary Code to Be Executed Source: SECTRACK Type: UNKNOWN 1015806 Source: CCN Type: RealNetworks Customer Support - Real Security Updates Web page RealNetworks Releases Product Updates - 03162006 Source: CCN Type: ASA-2006-075 RealPlayer security update (RHSA-2006-0257) Source: CCN Type: GLSA-200603-24 RealPlayer: Buffer overflow vulnerability Source: GENTOO Type: Patch, Vendor Advisory GLSA-200603-24 Source: CCN Type: US-CERT VU#231028 RealNetworks products vulnerable to buffer overflow via specially crafted flash media file Source: CERT-VN Type: Patch, Third Party Advisory, US Government Resource VU#231028 Source: SUSE Type: Patch, Vendor Advisory SUSE-SA:2006:018 Source: REDHAT Type: Patch, Vendor Advisory RHSA-2006:0257 Source: BUGTRAQ Type: UNKNOWN 20060411 Realplayer .SWF Multiple Remote Memory Corruption Vulnerabilities Source: BID Type: Exploit 17202 Source: CCN Type: BID-17202 RealNetworks Multiple Products Multiple Buffer Overflow Vulnerabilities Source: CONFIRM Type: Patch http://www.service.real.com/realplayer/security/03162006_player/en/ Source: CCN Type: TLSA-2006-14 Buffer overflow Source: VUPEN Type: UNKNOWN ADV-2006-1057 Source: XF Type: UNKNOWN realnetworks-swf-bo(25408) Source: XF Type: UNKNOWN realnetworks-swf-bo(25408) Source: SUSE Type: SUSE-SA:2006:018 RealPlayer security problems | ||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |