Vulnerability Name: CVE-2009-4248 (CCN-55801) Assigned: 2008-01-17 Published: 2008-01-17 Updated: 2017-09-19 Summary: Buffer overflow in the RTSPProtocol::HandleSetParameterRequest function in client/core/rtspprotocol.cpp in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted RTSP SET_PARAMETER request. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C )6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-119 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2009-4248 Source: MLIST Type: UNKNOWN[client-cvs] 20080117 core rtspprotocol.cpp,1.55.2.18,1.55.2.19 Source: MLIST Type: UNKNOWN[client-cvs] 20080117 core rtspprotocol.cpp,1.85,1.86 Source: MLIST Type: UNKNOWN[client-dev] 20080117 CR: fix for bug 211210 Source: CCN Type: RHSA-2010-0094Critical: HelixPlayer security update Source: CCN Type: SA38218RealPlayer Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory38218 Source: SECUNIA Type: UNKNOWN38450 Source: CCN Type: SECTRACK ID: 1023489RealPlayer Buffer Overflows Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: Patch1023489 Source: CCN Type: RealNetworks Web SiteRealNetworks, Inc. Releases Update to Address Security Vulnerabilities. Source: CONFIRM Type: Patch, Vendor Advisoryhttp://service.real.com/realplayer/security/01192010_player/en/ Source: CCN Type: OSVDB ID: 61972RealNetworks Multiple Products CMediumBlockAllocator::Alloc Method Crafted RTSP SET_PARAMETER Handling Overflow Source: REDHAT Type: UNKNOWNRHSA-2010:0094 Source: BID Type: UNKNOWN37880 Source: CCN Type: BID-37880Multiple RealNetworks Products Multiple Remote Vulnerabilities Source: VUPEN Type: Patch, Vendor AdvisoryADV-2010-0178 Source: CONFIRM Type: UNKNOWNhttps://bugzilla.redhat.com/show_bug.cgi?id=561361 Source: XF Type: UNKNOWNrealplayer-rtsp-setparameter-bo(55801) Source: XF Type: UNKNOWNrealplayer-rtsp-setparameter-bo(55801) Source: CONFIRM Type: UNKNOWNhttps://helixcommunity.org/viewcvs/client/core/rtspprotocol.cpp?view=log#rev1.55.2.19 Source: CONFIRM Type: UNKNOWNhttps://helixcommunity.org/viewcvs/client/core/rtspprotocol.cpp?view=log#rev1.86 Source: CCN Type: iDefense Public Advisory: 02.01.10RealNetworks RealPlayer CMediumBlockAllocator Integer Overflow Vulnerability Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:10641 Vulnerable Configuration: Configuration 1 :cpe:/a:realnetworks:realplayer:10.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.5:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer_enterprise:*:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:* AND cpe:/o:microsoft:windows:*:*:*:*:*:*:*:* Configuration 2 :cpe:/a:realnetworks:realplayer:10.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.1:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:* AND cpe:/o:apple:mac_os_x:*:*:*:*:*:*:*:* Configuration 3 :cpe:/a:realnetworks:helix_player:10.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:helix_player:11.0.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:helix_player:11.0.1:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.0:*:linux:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.0:*:linux:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.1:*:linux:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration CCN 1 :cpe:/a:real:realplayer:10.1:*:*:*:*:*:*:* AND cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.opensuse.security:def:20094248 V CVE-2009-4248 2015-11-16 oval:org.mitre.oval:def:10641 V Buffer overflow in the RTSPProtocol::HandleSetParameterRequest function in client/core/rtspprotocol.cpp in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted RTSP SET_PARAMETER request. 2013-04-29 oval:com.redhat.rhsa:def:20100094 P RHSA-2010:0094: HelixPlayer security update (Critical) 2010-02-09
BACK
realnetworks realplayer 10.0
realnetworks realplayer 10.5
realnetworks realplayer 11.0
realnetworks realplayer 11.0.1
realnetworks realplayer 11.0.2
realnetworks realplayer 11.0.3
realnetworks realplayer 11.0.4
realnetworks realplayer 11.0.5
realnetworks realplayer enterprise *
realnetworks realplayer sp 1.0.0
realnetworks realplayer sp 1.0.1
microsoft windows *
realnetworks realplayer 10.0
realnetworks realplayer 10.1
realnetworks realplayer 11.0
realnetworks realplayer 11.0.1
apple mac os x *
realnetworks helix player 10.0
realnetworks helix player 11.0.0
realnetworks helix player 11.0.1
realnetworks realplayer 10.0
realnetworks realplayer 11.0.0
realnetworks realplayer 11.0.1
real realplayer 10.1
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4