|
|||
Rule General Information |
---|
Release Date: | 2017-04-19 | |
Rule Name: | Realnetworks Realplayer Error Message Format String Vulnerability -2 (CVE-2005-2710) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote attackers to execute arbitrary code via the (1) image handle or (2) timeformat attribute in a RealPix (.rp) or RealText (.rt) file. | |
Impact: | A remote user may exploit the flaw by supplying a crafted RealPix multimedia file to a vulnerable target. An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Others, Other Unix, FreeBSD, Linux | |
Reference: | http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168078 http://marc.info/?l=bugtraq&m=112785544325326&w=2 http://marc.info/?l=full-disclosure&m=112775929608219&w=2 |
|
Solutions |
---|
More advisories have been published on the website, please visit for more suggestions: http://service.real.com/help/faq/security/050930_player/EN/ |