Vulnerability Name: | CVE-2009-4257 (CCN-55798) |
Assigned: | 2008-09-16 |
Published: | 2008-09-16 |
Updated: | 2018-10-10 |
Summary: | Heap-based buffer overflow in datatype/smil/common/smlpkt.cpp in smlrender.dll in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10 and 11.0.0, and Helix Player 10.x and 11.0.0 allows remote attackers to execute arbitrary code via an SMIL file with crafted string lengths. |
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-119 CWE-122
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2009-4257
Source: MLIST Type: UNKNOWN [datatype-cvs] 20080916 smil/common smlpkt.cpp,1.11,1.12
Source: CCN Type: RHSA-2010-0094 Critical: HelixPlayer security update
Source: CCN Type: SA38218 RealPlayer Multiple Vulnerabilities
Source: SECUNIA Type: Vendor Advisory 38218
Source: SECUNIA Type: Vendor Advisory 38450
Source: CCN Type: SECTRACK ID: 1023489 RealPlayer Buffer Overflows Let Remote Users Execute Arbitrary Code
Source: SECTRACK Type: Patch 1023489
Source: CCN Type: RealNetworks Web Site RealNetworks, Inc. Releases Update to Address Security Vulnerabilities.
Source: CONFIRM Type: Patch, Vendor Advisory http://service.real.com/realplayer/security/01192010_player/en/
Source: CCN Type: OSVDB ID: 61973 RealNetworks Multiple Products smlrender.dll SMIL File Handling Overflow
Source: REDHAT Type: UNKNOWN RHSA-2010:0094
Source: BUGTRAQ Type: UNKNOWN 20100121 ZDI-10-007: RealNetworks RealPlayer SMIL getAtom Remote Code Execution Vulnerability
Source: BID Type: UNKNOWN 37880
Source: CCN Type: BID-37880 Multiple RealNetworks Products Multiple Remote Vulnerabilities
Source: VUPEN Type: Patch, Vendor Advisory ADV-2010-0178
Source: MISC Type: Patch http://www.zerodayinitiative.com/advisories/ZDI-10-007/
Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=561309
Source: XF Type: UNKNOWN realnetworks-realplayer-smil-bo(55798)
Source: XF Type: UNKNOWN realnetworks-realplayer-smil-bo(55798)
Source: CONFIRM Type: UNKNOWN https://helixcommunity.org/viewcvs/datatype/smil/common/smlpkt.cpp?view=log#rev1.12
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:11110
Source: CCN Type: ZDI-10-007 RealNetworks RealPlayer SMIL getAtom Remote Code Execution Vulnerability
|
Vulnerable Configuration: | Configuration 1: cpe:/a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer_enterprise:*:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*AND cpe:/o:microsoft:windows:*:*:*:*:*:*:*:* Configuration 2: cpe:/a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:10.1:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*AND cpe:/o:apple:mac_os_x:*:*:*:*:*:*:*:* Configuration 3: cpe:/a:realnetworks:helix_player:10.0:*:*:*:*:*:*:*OR cpe:/a:realnetworks:helix_player:11.0.0:*:*:*:*:*:*:*OR cpe:/a:realnetworks:helix_player:11.0.1:*:*:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:10.0:*:linux:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:11.0.0:*:linux:*:*:*:*:*OR cpe:/a:realnetworks:realplayer:11.0.1:*:linux:*:*:*:*:* Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration CCN 1: cpe:/a:real:realplayer:10.1:*:*:*:*:*:*:*AND cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
Definition ID | Class | Title | Last Modified |
---|
oval:org.mitre.oval:def:11110 | V | Heap-based buffer overflow in datatype/smil/common/smlpkt.cpp in smlrender.dll in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10 and 11.0.0, and Helix Player 10.x and 11.0.0 allows remote attackers to execute arbitrary code via an SMIL file with crafted string lengths. | 2013-04-29 | oval:com.redhat.rhsa:def:20100094 | P | RHSA-2010:0094: HelixPlayer security update (Critical) | 2010-02-09 |
|
BACK |
realnetworks realplayer 10.0
realnetworks realplayer 10.5
realnetworks realplayer 11.0
realnetworks realplayer 11.0.1
realnetworks realplayer 11.0.2
realnetworks realplayer 11.0.3
realnetworks realplayer 11.0.4
realnetworks realplayer 11.0.5
realnetworks realplayer enterprise *
realnetworks realplayer sp 1.0.0
realnetworks realplayer sp 1.0.1
microsoft windows *
realnetworks realplayer 10.0
realnetworks realplayer 10.1
realnetworks realplayer 11.0
realnetworks realplayer 11.0.1
apple mac os x *
realnetworks helix player 10.0
realnetworks helix player 11.0.0
realnetworks helix player 11.0.1
realnetworks realplayer 10.0
realnetworks realplayer 11.0.0
realnetworks realplayer 11.0.1
real realplayer 10.1
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4