Vulnerability Name: | CVE-2007-3410 (CCN-35088) | ||||||||||||||||
Assigned: | 2007-06-26 | ||||||||||||||||
Published: | 2007-06-26 | ||||||||||||||||
Updated: | 2017-10-11 | ||||||||||||||||
Summary: | Stack-based buffer overflow in the SmilTimeValue::parseWallClockValue function in smlprstime.cpp in RealNetworks RealPlayer 10, 10.1, and possibly 10.5, RealOne Player, RealPlayer Enterprise, and Helix Player 10.5-GOLD and 10.0.5 through 10.0.8, allows remote attackers to execute arbitrary code via an SMIL (SMIL2) file with a long wallclock value. | ||||||||||||||||
CVSS v3 Severity: | 9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 7.3 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
6.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
| ||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2007-3410 Source: IDEFENSE Type: UNKNOWN 20070626 RealNetworks RealPlayer/HelixPlayer SMIL wallclock Stack Overflow Vulnerability Source: OSVDB Type: UNKNOWN 37374 Source: OSVDB Type: UNKNOWN 38342 Source: CCN Type: RHSA-2007-0605 Critical: HelixPlayer security update Source: CCN Type: RHSA-2007-0841 Critical: RealPlayer security update Source: CCN Type: SA25819 RealPlayer/Helix Player SMIL wallclock Buffer Overflow Vulnerability Source: SECUNIA Type: Vendor Advisory 25819 Source: SECUNIA Type: Vendor Advisory 25859 Source: SECUNIA Type: Vendor Advisory 26463 Source: SECUNIA Type: Vendor Advisory 26828 Source: CCN Type: SA27361 RealPlayer/RealOne/HelixPlayer Multiple Buffer Overflows Source: SECUNIA Type: Vendor Advisory 27361 Source: GENTOO Type: UNKNOWN GLSA-200709-05 Source: CCN Type: SECTRACK ID: 1018297 Helix Player SMIL parseWallClockValue() Stack Overflow Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1018297 Source: CCN Type: SECTRACK ID: 1018299 RealPlayer SMIL parseWallClockValue() Stack Overflow Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1018299 Source: CONFIRM Type: UNKNOWN http://service.real.com/realplayer/security/10252007_player/en/ Source: CCN Type: ASA-2007-274 HelixPlayer security update (RHSA-2007-0605) Source: CCN Type: ASA-2007-385 RealPlayer security update (RHSA-2007-0841) Source: VIM Type: UNKNOWN 20071030 RealPlayer Updates of October 25, 2007 Source: CCN Type: GLSA-200709-05 RealPlayer: Buffer overflow Source: CCN Type: US-CERT VU#770904 RealNetworks players SMIL "wallclock" buffer overflow Source: CERT-VN Type: US Government Resource VU#770904 Source: CCN Type: OSVDB ID: 37374 RealPlayer/Helix Player smlprstime.cpp SmilTimeValue::parseWallClockValue Function SMIL File Handling Overflow Source: CCN Type: OSVDB ID: 38342 RealPlayer smlprstime.cpp SmilTimeValue::parseWallClockValue Function SMIL File Handling Overflow Source: REDHAT Type: UNKNOWN RHSA-2007:0605 Source: REDHAT Type: UNKNOWN RHSA-2007:0841 Source: BID Type: UNKNOWN 24658 Source: CCN Type: BID-24658 RealPlayer/HelixPlayer ParseWallClockValue Function Buffer Overflow Vulnerability Source: CCN Type: RealNetworks Customer Support - Real Security Updates Web page RealNetworks, Inc. Releases Update to Address Security Vulnerabilities. Source: VUPEN Type: UNKNOWN ADV-2007-2339 Source: VUPEN Type: UNKNOWN ADV-2007-3628 Source: XF Type: UNKNOWN realplayer-smiltime-wallclockvalue-bo(35088) Source: XF Type: UNKNOWN realplayer-smiltime-wallclockvalue-bo(35088) Source: CCN Type: iDefense Labs PUBLIC ADVISORY: 06.26.07 RealNetworks RealPlayer/HelixPlayer SMIL wallclock Stack Overflow Vulnerability Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10554 Source: CCN Type: Helix Player Community Download Web page Player Downloads | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration CCN 1: ![]() | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |