Vulnerability Name:

CVE-2009-0376 (CCN-48568)

Assigned:2009-02-05
Published:2009-02-05
Updated:2018-10-11
Summary:Heap-based buffer overflow in a DLL file in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows remote attackers to execute arbitrary code via a crafted Internet Video Recording (IVR) file with a modified field that controls an unspecified structure length and triggers heap corruption, related to use of RealPlayer through a Windows Explorer plugin.
CVSS v3 Severity:9.4 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): Low
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.0 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:P/A:C)
6.7 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:P/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Partial
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2009-0376

Source: CCN
Type: SA33810
RealPlayer IVR File Processing Two Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
33810

Source: CCN
Type: SA38218
RealPlayer Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
38218

Source: CCN
Type: RealNetworks Web Site
RealNetworks, Inc. Releases Update to Address Security Vulnerabilities.

Source: CONFIRM
Type: UNKNOWN
http://service.real.com/realplayer/security/01192010_player/en/

Source: CCN
Type: FortiGuard Advisory (FGA-2009-04)
Fortinet discovers multiple vulnerabilities in RealNetworks' RealPlayer

Source: MISC
Type: UNKNOWN
http://www.fortiguardcenter.com/advisory/FGA-2009-04.html

Source: CCN
Type: OSVDB ID: 54298
RealPlayer Internet Video Recording (IVR) File Handling Unspecified Heap Corruption Arbitrary Code Execution

Source: CCN
Type: RealPlayer Web site
RealPlayer

Source: BUGTRAQ
Type: UNKNOWN
20090206 RealNetworks RealPlayer IVR File Processing Multiple Code Execute Vulnerabilities

Source: BUGTRAQ
Type: UNKNOWN
20100121 ZDI-10-009: RealNetworks RealPlayer IVR Format Remote Code Execution Vulnerability

Source: BID
Type: UNKNOWN
33652

Source: CCN
Type: BID-33652
RealNetworks RealPlayer IVR File Parsing Multiple Buffer Overflow Vulnerabilities

Source: CCN
Type: BID-37880
Multiple RealNetworks Products Multiple Remote Vulnerabilities

Source: VUPEN
Type: UNKNOWN
ADV-2010-0178

Source: MISC
Type: UNKNOWN
http://www.zerodayinitiative.com/advisories/ZDI-10-009/

Source: XF
Type: UNKNOWN
realplayer-ivr-code-execution(48568)

Source: XF
Type: UNKNOWN
realplayer-ivr-code-execution(48568)

Source: CCN
Type: ZDI-10-009
RealNetworks RealPlayer IVR Format Remote Code Execution Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:realnetworks:realplayer:11:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    realnetworks realplayer 11