Vulnerability Name: CVE-2009-4257 (CCN-55798) Assigned: 2008-09-16 Published: 2008-09-16 Updated: 2018-10-10 Summary: Heap-based buffer overflow in datatype/smil/common/smlpkt.cpp in smlrender.dll in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10 and 11.0.0, and Helix Player 10.x and 11.0.0 allows remote attackers to execute arbitrary code via an SMIL file with crafted string lengths. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C )6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-119 CWE-122 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2009-4257 Source: MLIST Type: UNKNOWN[datatype-cvs] 20080916 smil/common smlpkt.cpp,1.11,1.12 Source: CCN Type: RHSA-2010-0094Critical: HelixPlayer security update Source: CCN Type: SA38218RealPlayer Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory38218 Source: SECUNIA Type: Vendor Advisory38450 Source: CCN Type: SECTRACK ID: 1023489RealPlayer Buffer Overflows Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: Patch1023489 Source: CCN Type: RealNetworks Web SiteRealNetworks, Inc. Releases Update to Address Security Vulnerabilities. Source: CONFIRM Type: Patch, Vendor Advisoryhttp://service.real.com/realplayer/security/01192010_player/en/ Source: CCN Type: OSVDB ID: 61973RealNetworks Multiple Products smlrender.dll SMIL File Handling Overflow Source: REDHAT Type: UNKNOWNRHSA-2010:0094 Source: BUGTRAQ Type: UNKNOWN20100121 ZDI-10-007: RealNetworks RealPlayer SMIL getAtom Remote Code Execution Vulnerability Source: BID Type: UNKNOWN37880 Source: CCN Type: BID-37880Multiple RealNetworks Products Multiple Remote Vulnerabilities Source: VUPEN Type: Patch, Vendor AdvisoryADV-2010-0178 Source: MISC Type: Patchhttp://www.zerodayinitiative.com/advisories/ZDI-10-007/ Source: CONFIRM Type: UNKNOWNhttps://bugzilla.redhat.com/show_bug.cgi?id=561309 Source: XF Type: UNKNOWNrealnetworks-realplayer-smil-bo(55798) Source: XF Type: UNKNOWNrealnetworks-realplayer-smil-bo(55798) Source: CONFIRM Type: UNKNOWNhttps://helixcommunity.org/viewcvs/datatype/smil/common/smlpkt.cpp?view=log#rev1.12 Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:11110 Source: CCN Type: ZDI-10-007RealNetworks RealPlayer SMIL getAtom Remote Code Execution Vulnerability Vulnerable Configuration: Configuration 1 :cpe:/a:realnetworks:realplayer:10.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.5:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer_enterprise:*:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:* AND cpe:/o:microsoft:windows:*:*:*:*:*:*:*:* Configuration 2 :cpe:/a:realnetworks:realplayer:10.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.1:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:* AND cpe:/o:apple:mac_os_x:*:*:*:*:*:*:*:* Configuration 3 :cpe:/a:realnetworks:helix_player:10.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:helix_player:11.0.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:helix_player:11.0.1:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.0:*:linux:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.0:*:linux:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:11.0.1:*:linux:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration CCN 1 :cpe:/a:real:realplayer:10.1:*:*:*:*:*:*:* AND cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.mitre.oval:def:11110 V Heap-based buffer overflow in datatype/smil/common/smlpkt.cpp in smlrender.dll in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10 and 11.0.0, and Helix Player 10.x and 11.0.0 allows remote attackers to execute arbitrary code via an SMIL file with crafted string lengths. 2013-04-29 oval:com.redhat.rhsa:def:20100094 P RHSA-2010:0094: HelixPlayer security update (Critical) 2010-02-09
BACK
realnetworks realplayer 10.0
realnetworks realplayer 10.5
realnetworks realplayer 11.0
realnetworks realplayer 11.0.1
realnetworks realplayer 11.0.2
realnetworks realplayer 11.0.3
realnetworks realplayer 11.0.4
realnetworks realplayer 11.0.5
realnetworks realplayer enterprise *
realnetworks realplayer sp 1.0.0
realnetworks realplayer sp 1.0.1
microsoft windows *
realnetworks realplayer 10.0
realnetworks realplayer 10.1
realnetworks realplayer 11.0
realnetworks realplayer 11.0.1
apple mac os x *
realnetworks helix player 10.0
realnetworks helix player 11.0.0
realnetworks helix player 11.0.1
realnetworks realplayer 10.0
realnetworks realplayer 11.0.0
realnetworks realplayer 11.0.1
real realplayer 10.1
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4