Vulnerability Name: CVE-2009-4247 (CCN-55802) Assigned: 2009-08-28 Published: 2009-08-28 Updated: 2017-09-19 Summary: Stack-based buffer overflow in protocol/rtsp/rtspclnt.cpp in RealNetworks RealPlayer 10; RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741; RealPlayer 11 11.0.x; RealPlayer SP 1.0.0 and 1.0.1; RealPlayer Enterprise; Mac RealPlayer 10, 10.1, 11.0, and 11.0.1; Linux RealPlayer 10, 11.0.0, and 11.0.1; and Helix Player 10.x, 11.0.0, and 11.0.1 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an ASM RuleBook with a large number of rules, related to an "array overflow." CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C )6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-119 CWE-121 Vulnerability Consequences: Gain Access References: Source: CCN Type: Sun Security BlogCVE-2009-4247 Buffer Overflow Vulnerability in RealPlayer Source: MITRE Type: CNACVE-2009-4247 Source: MLIST Type: UNKNOWN[helix-client-dev] 20090828 CR: 249097 - Security fix - urgent CR requested Source: MLIST Type: UNKNOWN[protocol-cvs] 20090828 rtsp rtspclnt.cpp,1.244,1.245 Source: CCN Type: RHSA-2010-0094Critical: HelixPlayer security update Source: CCN Type: SA38218RealPlayer Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory38218 Source: SECUNIA Type: Vendor Advisory38450 Source: CCN Type: SA40581Sun Solaris RealPlayer Buffer Overflow Vulnerability Source: CCN Type: SECTRACK ID: 1023489RealPlayer Buffer Overflows Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: Patch1023489 Source: CCN Type: RealNetworks Web siteRealNetworks, Inc. Releases Update to Address Security Vulnerabilities. Source: CONFIRM Type: Patch, Vendor Advisoryhttp://service.real.com/realplayer/security/01192010_player/en/ Source: CCN Type: OSVDB ID: 61971RealNetworks Multiple Products Crafted ASM RuleBook Overflow Source: REDHAT Type: UNKNOWNRHSA-2010:0094 Source: BID Type: UNKNOWN37880 Source: CCN Type: BID-37880Multiple RealNetworks Products Multiple Remote Vulnerabilities Source: VUPEN Type: Patch, Vendor AdvisoryADV-2010-0178 Source: CONFIRM Type: UNKNOWNhttps://bugzilla.redhat.com/show_bug.cgi?id=561338 Source: XF Type: UNKNOWNrealplayer-rulebook-overflow(55802) Source: XF Type: UNKNOWNrealplayer-rulebook-overflow(55802) Source: CONFIRM Type: UNKNOWNhttps://helixcommunity.org/viewcvs/protocol/rtsp/rtspclnt.cpp?view=log#rev1.245 Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:10677 Vulnerable Configuration: Configuration 1 :cpe:/a:realnetworks:realplayer:10.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.5:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer_enterprise:*:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:* AND cpe:/o:microsoft:windows:*:*:*:*:*:*:*:* Configuration 2 :cpe:/a:realnetworks:realplayer:10.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.1:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:* AND cpe:/o:apple:mac_os_x:*:*:*:*:*:*:*:* Configuration 3 :cpe:/a:realnetworks:helix_player:10.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:helix_player:11.0.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:helix_player:11.0.1:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.0:*:linux:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.0:*:linux:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.1:*:linux:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration CCN 1 :cpe:/a:real:realplayer:10.1:*:*:*:*:*:*:* AND cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:sun:solaris:10::sparc:*:*:*:*:* OR cpe:/o:sun:solaris:10::x86:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.mitre.oval:def:10677 V Stack-based buffer overflow in protocol/rtsp/rtspclnt.cpp in RealNetworks RealPlayer 10; RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741; RealPlayer 11 11.0.x; RealPlayer SP 1.0.0 and 1.0.1; RealPlayer Enterprise; Mac RealPlayer 10, 10.1, 11.0, and 11.0.1; Linux RealPlayer 10, 11.0.0, and 11.0.1; and Helix Player 10.x, 11.0.0, and 11.0.1 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an ASM RuleBook with a large number of rules, related to an "array overflow." 2013-04-29 oval:com.redhat.rhsa:def:20100094 P RHSA-2010:0094: HelixPlayer security update (Critical) 2010-02-09
BACK
realnetworks realplayer 10.0
realnetworks realplayer 10.5
realnetworks realplayer 11.0
realnetworks realplayer 11.0.1
realnetworks realplayer 11.0.2
realnetworks realplayer 11.0.3
realnetworks realplayer 11.0.4
realnetworks realplayer 11.0.5
realnetworks realplayer enterprise *
realnetworks realplayer sp 1.0.0
realnetworks realplayer sp 1.0.1
microsoft windows *
realnetworks realplayer 10.0
realnetworks realplayer 10.1
realnetworks realplayer 11.0
realnetworks realplayer 11.0.1
apple mac os x *
realnetworks helix player 10.0
realnetworks helix player 11.0.0
realnetworks helix player 11.0.1
realnetworks realplayer 10.0
realnetworks realplayer 11.0.0
realnetworks realplayer 11.0.1
real realplayer 10.1
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
sun solaris 10
sun solaris 10