Vulnerability Name: | CVE-2010-4378 (CCN-64006) | ||||||||||||
Assigned: | 2010-12-10 | ||||||||||||
Published: | 2010-12-10 | ||||||||||||
Updated: | 2011-01-26 | ||||||||||||
Summary: | The drv2.dll (aka RV20 decompression) module in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, RealPlayer Enterprise 2.1.2 and 2.1.3, Linux RealPlayer 11.0.2.1744, and possibly HelixPlayer 1.0.6 and other versions, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted value of an unspecified length field in an RV20 video stream. | ||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2010-4378 Source: CCN Type: RHSA-2010-0981 Critical: HelixPlayer removal Source: CCN Type: RHSA-2010:0981-1 Critical: HelixPlayer removal Source: CCN Type: SA38550 RealPlayer Multiple Vulnerabilities Source: CCN Type: SA42333 RealPlayer Enterprise Multiple Vulnerabilities Source: CCN Type: SA42512 Mac RealPlayer Multiple Vulnerabilities Source: CCN Type: SA42532 Red Hat HelixPlayer Multiple Vulnerabilities Source: CCN Type: SECTRACK ID: 1024861 RealPlayer Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code Source: CCN Type: RealNetworks Web Site RealNetworks, Inc. Releases Update to Address Security Vulnerabilities Source: CONFIRM Type: Vendor Advisory http://service.real.com/realplayer/security/12102010_player/en/ Source: CCN Type: OSVDB ID: 69839 RealPlayer Multiple Products RV20 Decompression Module Video Stream Length Field Memory Corruption Source: REDHAT Type: UNKNOWN RHSA-2010:0981 Source: CCN Type: BID-45414 Real Networks RealPlayer RV20 Video Streams Heap Overflow Vulnerability Source: SECTRACK Type: UNKNOWN 1024861 Source: MISC Type: UNKNOWN http://www.zerodayinitiative.com/advisories/ZDI-10-274 Source: XF Type: UNKNOWN realplayer-rv20-code-exec(64006) Source: CCN Type: ZDI-10-274 RealNetworks Realplayer RV20 Stream Parsing Remote Code Execution Vulnerability | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |