Vulnerability Name: CVE-2007-2263 (CCN-37436) Assigned: 2007-10-25 Published: 2007-10-25 Updated: 2018-10-16 Summary: Heap-based buffer overflow in RealNetworks RealPlayer 10.0, 10.1, and possibly 10.5, RealOne Player, and RealPlayer Enterprise allows remote attackers to execute arbitrary code via an SWF (Flash) file with malformed record headers. CVSS v3 Severity: 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C )6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C )6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-119 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2007-2263 Source: OSVDB Type: UNKNOWN38344 Source: CCN Type: RHSA-2007-0841Critical: RealPlayer security update Source: CCN Type: SA27361RealPlayer/RealOne/HelixPlayer Multiple Buffer Overflows Source: SECUNIA Type: Patch, Vendor Advisory27361 Source: CCN Type: SECTRACK ID: 1018866RealPlayer Buffer Overflows in Processing MP3, RM, SWF, RAM, and PLS Files Lets Remote Users Execute Arbitrary Code Source: CONFIRM Type: Patchhttp://service.real.com/realplayer/security/10252007_player/en/ Source: VIM Type: UNKNOWN20071030 RealPlayer Updates of October 25, 2007 Source: CCN Type: OSVDB ID: 38344RealPlayer SWF File Handling Overflow Source: BUGTRAQ Type: UNKNOWN20071031 ZDI-07-061: RealNetworks RealPlayer SWF Processing Remote Code Execution Vulnerability Source: BID Type: Patch26214 Source: CCN Type: BID-26214RealNetworks RealPlayer File Parsing Routines Multiple Vulnerabilities Source: BID Type: UNKNOWN26284 Source: CCN Type: BID-26284RealNetworks RealPlayer SWF File Processing Remote Code Execution Vulnerability Source: SECTRACK Type: UNKNOWN1018866 Source: CCN Type: RealNetworks Customer Support - Real Security Updates Web pageRealNetworks, Inc. Releases Update to Address Security Vulnerabilities. Source: VUPEN Type: Vendor AdvisoryADV-2007-3628 Source: MISC Type: UNKNOWNhttp://www.zerodayinitiative.com/advisories/ZDI-07-061.html Source: XF Type: UNKNOWNrealplayer-swf-bo(37436) Source: XF Type: UNKNOWNrealplayer-swf-bo(37436) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:11432 Source: CCN Type: ZDI-07-061RealNetworks RealPlayer SWF Processing Remote Code Execution Vulnerability Vulnerable Configuration: Configuration 1 :cpe:/a:realnetworks:realone_player:*:*:mac:en:*:*:*:* OR cpe:/a:realnetworks:realone_player:2.0:*:windows:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.0:*:windows:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.0:10.0.0.305:mac:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.0:10.0.0.331:mac:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.0:10.0.0.352:mac:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.0:10.0.5:linux:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.0:10.0.6:linux:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.0:10.0.7:linux:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.0:10.0.8:linux:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.0:10.0.9:linux:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.1:10.0.0.396:mac:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.1:10.0.0.412:mac:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.5:6.0.12.1040:windows:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.5:6.0.12.1578:windows:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.5:6.0.12.1698:windows:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.5:6.0.12.1741:windows:*:*:*:*:* OR cpe:/a:realnetworks:realplayer_enterprise:*:*:windows:en:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.mitre.oval:def:11432 V Heap-based buffer overflow in RealNetworks RealPlayer 10.0, 10.1, and possibly 10.5, RealOne Player, and RealPlayer Enterprise allows remote attackers to execute arbitrary code via an SWF (Flash) file with malformed record headers. 2010-09-06
BACK
realnetworks realone player *
realnetworks realone player 2.0
realnetworks realplayer 10.0
realnetworks realplayer 10.0 10.0.0.305
realnetworks realplayer 10.0 10.0.0.331
realnetworks realplayer 10.0 10.0.0.352
realnetworks realplayer 10.0 10.0.5
realnetworks realplayer 10.0 10.0.6
realnetworks realplayer 10.0 10.0.7
realnetworks realplayer 10.0 10.0.8
realnetworks realplayer 10.0 10.0.9
realnetworks realplayer 10.1 10.0.0.396
realnetworks realplayer 10.1 10.0.0.412
realnetworks realplayer 10.5 6.0.12.1040
realnetworks realplayer 10.5 6.0.12.1578
realnetworks realplayer 10.5 6.0.12.1698
realnetworks realplayer 10.5 6.0.12.1741
realnetworks realplayer enterprise *