Vulnerability Name: | CVE-2009-4245 (CCN-55800) |
Assigned: | 2008-07-23 |
Published: | 2008-07-23 |
Updated: | 2017-09-19 |
Summary: | Heap-based buffer overflow in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a compressed GIF file, related to gifcodec.cpp and gifimage.cpp. |
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-119
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2009-4245
Source: MLIST Type: UNKNOWN [datatype-cvs] 20080722 image/gif/common gifcodec.cpp, 1.6, 1.7 gifimage.cpp, 1.5, 1.6
Source: OSVDB Type: UNKNOWN 61969
Source: CCN Type: RHSA-2010-0094 Critical: HelixPlayer security update
Source: CCN Type: SA38218 RealPlayer Multiple Vulnerabilities
Source: SECUNIA Type: Vendor Advisory 38218
Source: SECUNIA Type: UNKNOWN 38450
Source: CCN Type: SECTRACK ID: 1023489 RealPlayer Buffer Overflows Let Remote Users Execute Arbitrary Code
Source: SECTRACK Type: Patch 1023489
Source: CCN Type: RealNetworks Web Site RealNetworks, Inc. Releases Update to Address Security Vulnerabilities.
Source: CONFIRM Type: Patch, Vendor Advisory http://service.real.com/realplayer/security/01192010_player/en/
Source: CCN Type: OSVDB ID: 61969 RealNetworks Multiple Products Compressed GIF File Handling Overflow
Source: REDHAT Type: UNKNOWN RHSA-2010:0094
Source: BID Type: UNKNOWN 37880
Source: CCN Type: BID-37880 Multiple RealNetworks Products Multiple Remote Vulnerabilities
Source: VUPEN Type: Patch, Vendor Advisory ADV-2010-0178
Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=561441
Source: XF Type: UNKNOWN realplayer-gifimage-bo(55800)
Source: XF Type: UNKNOWN realplayer-gifimage-bo(55800)
Source: CONFIRM Type: UNKNOWN https://helixcommunity.org/viewcvs/datatype/image/gif/common/gifcodec.cpp?view=log#rev1.7
Source: CONFIRM Type: UNKNOWN https://helixcommunity.org/viewcvs/datatype/image/gif/common/gifimage.cpp?view=log#rev1.6
Source: CONFIRM Type: UNKNOWN https://helixcommunity.org/viewcvs/datatype/image/gif/common/pub/gifcodec.h?view=log#rev1.5
Source: CCN Type: iDefense Public Advisory: 02.01.10 Real Networks RealPlayer Compressed GIF Handling Integer Overflow
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:9998
|
Vulnerable Configuration: | Configuration 1: cpe:/a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer_enterprise:*:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*AND cpe:/o:microsoft:windows:*:*:*:*:*:*:*:* Configuration 2: cpe:/a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:10.1:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*AND cpe:/o:apple:mac_os_x:*:*:*:*:*:*:*:* Configuration 3: cpe:/a:realnetworks:helix_player:10.0:*:*:*:*:*:*:*OR cpe:/a:realnetworks:helix_player:11.0.0:*:*:*:*:*:*:*OR cpe:/a:realnetworks:helix_player:11.0.1:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:10.0:*:linux:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:11.0.0:*:linux:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:11.0.1:*:linux:*:*:*:*:* Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration CCN 1: cpe:/a:real:realplayer:10.1:*:*:*:*:*:*:*AND cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
Definition ID | Class | Title | Last Modified |
---|
oval:org.mitre.oval:def:9998 | V | Heap-based buffer overflow in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a compressed GIF file, related to gifcodec.cpp and gifimage.cpp. | 2013-04-29 | oval:com.redhat.rhsa:def:20100094 | P | RHSA-2010:0094: HelixPlayer security update (Critical) | 2010-02-09 |
|
BACK |
realnetworks realplayer 10.0
realnetworks realplayer 10.5
realnetworks realplayer 11.0
realnetworks realplayer 11.0.1
realnetworks realplayer 11.0.2
realnetworks realplayer 11.0.3
realnetworks realplayer 11.0.4
realnetworks realplayer 11.0.5
realnetworks realplayer enterprise *
realnetworks realplayer sp 1.0.0
realnetworks realplayer sp 1.0.1
microsoft windows *
realnetworks realplayer 10.0
realnetworks realplayer 10.1
realnetworks realplayer 11.0
realnetworks realplayer 11.0.1
apple mac os x *
realnetworks helix player 10.0
realnetworks helix player 11.0.0
realnetworks helix player 11.0.1
realnetworks realplayer 10.0
realnetworks realplayer 11.0.0
realnetworks realplayer 11.0.1
real realplayer 10.1
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4