Vulnerability Name:

CVE-2009-4247 (CCN-55802)

Assigned:2009-08-28
Published:2009-08-28
Updated:2017-09-19
Summary:Stack-based buffer overflow in protocol/rtsp/rtspclnt.cpp in RealNetworks RealPlayer 10; RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741; RealPlayer 11 11.0.x; RealPlayer SP 1.0.0 and 1.0.1; RealPlayer Enterprise; Mac RealPlayer 10, 10.1, 11.0, and 11.0.1; Linux RealPlayer 10, 11.0.0, and 11.0.1; and Helix Player 10.x, 11.0.0, and 11.0.1 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an ASM RuleBook with a large number of rules, related to an "array overflow."
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
CWE-121
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Sun Security Blog
CVE-2009-4247 Buffer Overflow Vulnerability in RealPlayer

Source: MITRE
Type: CNA
CVE-2009-4247

Source: MLIST
Type: UNKNOWN
[helix-client-dev] 20090828 CR: 249097 - Security fix - urgent CR requested

Source: MLIST
Type: UNKNOWN
[protocol-cvs] 20090828 rtsp rtspclnt.cpp,1.244,1.245

Source: CCN
Type: RHSA-2010-0094
Critical: HelixPlayer security update

Source: CCN
Type: SA38218
RealPlayer Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
38218

Source: SECUNIA
Type: Vendor Advisory
38450

Source: CCN
Type: SA40581
Sun Solaris RealPlayer Buffer Overflow Vulnerability

Source: CCN
Type: SECTRACK ID: 1023489
RealPlayer Buffer Overflows Let Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: Patch
1023489

Source: CCN
Type: RealNetworks Web site
RealNetworks, Inc. Releases Update to Address Security Vulnerabilities.

Source: CONFIRM
Type: Patch, Vendor Advisory
http://service.real.com/realplayer/security/01192010_player/en/

Source: CCN
Type: OSVDB ID: 61971
RealNetworks Multiple Products Crafted ASM RuleBook Overflow

Source: REDHAT
Type: UNKNOWN
RHSA-2010:0094

Source: BID
Type: UNKNOWN
37880

Source: CCN
Type: BID-37880
Multiple RealNetworks Products Multiple Remote Vulnerabilities

Source: VUPEN
Type: Patch, Vendor Advisory
ADV-2010-0178

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=561338

Source: XF
Type: UNKNOWN
realplayer-rulebook-overflow(55802)

Source: XF
Type: UNKNOWN
realplayer-rulebook-overflow(55802)

Source: CONFIRM
Type: UNKNOWN
https://helixcommunity.org/viewcvs/protocol/rtsp/rtspclnt.cpp?view=log#rev1.245

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10677

Vulnerable Configuration:Configuration 1:
  • cpe:/a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer_enterprise:*:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*
  • AND
  • cpe:/o:microsoft:windows:*:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.1:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*
  • AND
  • cpe:/o:apple:mac_os_x:*:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:realnetworks:helix_player:10.0:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:helix_player:11.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:helix_player:11.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.0:*:linux:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:11.0.0:*:linux:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:11.0.1:*:linux:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:real:realplayer:10.1:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10::sparc:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10::x86:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:10677
    V
    Stack-based buffer overflow in protocol/rtsp/rtspclnt.cpp in RealNetworks RealPlayer 10; RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741; RealPlayer 11 11.0.x; RealPlayer SP 1.0.0 and 1.0.1; RealPlayer Enterprise; Mac RealPlayer 10, 10.1, 11.0, and 11.0.1; Linux RealPlayer 10, 11.0.0, and 11.0.1; and Helix Player 10.x, 11.0.0, and 11.0.1 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an ASM RuleBook with a large number of rules, related to an "array overflow."
    2013-04-29
    oval:com.redhat.rhsa:def:20100094
    P
    RHSA-2010:0094: HelixPlayer security update (Critical)
    2010-02-09
    BACK
    realnetworks realplayer 10.0
    realnetworks realplayer 10.5
    realnetworks realplayer 11.0
    realnetworks realplayer 11.0.1
    realnetworks realplayer 11.0.2
    realnetworks realplayer 11.0.3
    realnetworks realplayer 11.0.4
    realnetworks realplayer 11.0.5
    realnetworks realplayer enterprise *
    realnetworks realplayer sp 1.0.0
    realnetworks realplayer sp 1.0.1
    microsoft windows *
    realnetworks realplayer 10.0
    realnetworks realplayer 10.1
    realnetworks realplayer 11.0
    realnetworks realplayer 11.0.1
    apple mac os x *
    realnetworks helix player 10.0
    realnetworks helix player 11.0.0
    realnetworks helix player 11.0.1
    realnetworks realplayer 10.0
    realnetworks realplayer 11.0.0
    realnetworks realplayer 11.0.1
    real realplayer 10.1
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    sun solaris 10
    sun solaris 10