5.1
CVSSv2

CVE-2005-2629

Published: 18/11/2005 Updated: 03/05/2018
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 515
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in RealNetworks RealPlayer 8, 10, and 10.5, RealOne Player 1 and 2, and Helix Player 10.0.0 allows remote malicious users to execute arbitrary code via an .rm movie file with a large value in the length field of the first data packet, which leads to a stack-based buffer overflow, a different vulnerability than CVE-2004-1481.

Vulnerable Product Search on Vulmon Subscribe to Product

realnetworks realone player 1.0

realnetworks realone player 2.0

realnetworks realplayer 10.5_6.0.12.1053

realnetworks realplayer 10.5_6.0.12.1056

realnetworks helix player 1.0.3

realnetworks helix player 1.0.4

realnetworks realplayer 10.0

realnetworks realplayer 10.5_6.0.12.1235

realnetworks realplayer 8.0

realnetworks helix player 1.0.1

realnetworks helix player 1.0.2

realnetworks realplayer

realnetworks realplayer 10.5_6.0.12.1059

realnetworks realplayer 10.5_6.0.12.1069

realnetworks helix player 1.0.5

realnetworks helix player 1.0

realnetworks realplayer 10.5

realnetworks realplayer 10.5_6.0.12.1040

Vendor Advisories

Synopsis RealPlayer security update Type/Severity Security Advisory: Critical Topic An updated RealPlayer package that fixes a format string bug is now availableThis update has been rated as having critical security impact by the Red HatSecurity Response Team Description RealPlayer is a m ...
Synopsis HelixPlayer security update Type/Severity Security Advisory: Critical Topic An updated HelixPlayer package that fixes a string format issue is nowavailableThis update has been rated as having critical security impact by the RedHat Security Response Team Description HelixPlayer is ...

Exploits

/* source: wwwsecurityfocuscom/bid/15381/info RealNetworks RealPlayer and RealOne Player are reported prone to a remote stack-based buffer-overflow vulnerability The applications fail to perform boundary checks when parsing RM (Real Media) files A remote attacker may execute arbitrary code on a vulnerable computer to gain unauthorized a ...