Vulnerability Name:

CVE-2008-3066 (CCN-44013)

Assigned:2008-07-25
Published:2008-07-25
Updated:2018-10-30
Summary:Stack-based buffer overflow in a certain ActiveX control in rjbdll.dll in RealNetworks RealPlayer Enterprise, RealPlayer 10, and RealPlayer 10.5 before build 6.0.12.1675 allows remote attackers to execute arbitrary code by importing a file into a media library and then deleting this file.
RealPlayer has indicated that a version exists called "enterprise."

Link: http://service.real.com/realplayer/security/07252008_player/en/
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2008-3066

Source: CCN
Type: SA27620
RealNetworks RealPlayer Multiple Vulnerabilities

Source: CCN
Type: SECTRACK ID: 1020565
RealPlayer ActiveX Control Buffer Overflow in Import Method May Let Remote Users Execute Abitrary Code

Source: SECTRACK
Type: UNKNOWN
1020565

Source: CCN
Type: Real Player Customer Support Web site
RealNetworks, Inc. Releases Update to Address Security Vulnerabilities

Source: CONFIRM
Type: UNKNOWN
http://service.real.com/realplayer/security/07252008_player/en/

Source: CCN
Type: US-CERT VU#461187
RealPlayer file deletion overflow vulnerability

Source: CERT-VN
Type: US Government Resource
VU#461187

Source: CCN
Type: OSVDB ID: 48286
RealPlayer rjbdll.dll ActiveX Media Library File Deletion Overflow

Source: BUGTRAQ
Type: UNKNOWN
20080725 http://www.zerodayinitiative.com/advisories/ZDI-08-046

Source: BID
Type: UNKNOWN
30376

Source: CCN
Type: BID-30376
RealNetworks RealPlayer 'rmoc3260.dll' ActiveX Control Multiple Memory Corruption Vulnerabilities

Source: BID
Type: UNKNOWN
30379

Source: CCN
Type: BID-30379
RealPlayer 'rjbdll.dll' ActiveX Control 'Import' Method Stack Buffer Overflow Vulnerability

Source: VUPEN
Type: UNKNOWN
ADV-2008-2194

Source: MISC
Type: UNKNOWN
http://www.zerodayinitiative.com/advisories/ZDI-08-046/

Source: XF
Type: UNKNOWN
realplayer-rjbdll-activex-bo(44013)

Source: XF
Type: UNKNOWN
realplayer-rjbdll-activex-bo(44013)

Source: CCN
Type: ZDI-08-046
RealNetworks RealPlayer Library File Deletion Stack Overflow Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    realnetworks realplayer 10.0
    realnetworks realplayer 10.5