5.1
CVSSv2

CVE-2005-2710

Published: 27/09/2005 Updated: 11/10/2017
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 515
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote malicious users to execute arbitrary code via the (1) image handle or (2) timeformat attribute in a RealPix (.rp) or RealText (.rt) file.

Vulnerable Product Search on Vulmon Subscribe to Product

realnetworks helix player

realnetworks realplayer 10.0

Vendor Advisories

Synopsis RealPlayer security update Type/Severity Security Advisory: Critical Topic An updated RealPlayer package that fixes a format string bug is now availableThis update has been rated as having critical security impact by the Red HatSecurity Response Team Description RealPlayer is a m ...
Synopsis HelixPlayer security update Type/Severity Security Advisory: Critical Topic An updated HelixPlayer package that fixes a string format issue is nowavailableThis update has been rated as having critical security impact by the RedHat Security Response Team Description HelixPlayer is ...
Multiple security vulnerabilities have been identified in the helix-player media player that could allow an attacker to execute code on the victim's machine via specially crafted network resources CAN-2005-1766 Buffer overflow in the RealText parser could allow remote code execution via a specially crafted RealMedia file with a lo ...

Exploits

/* ***************************************************************************************************************** $ An open security advisory #13 - RealPlayer and Helix Player Remote Format String Exploit ***************************************************************************************************************** 1: Bug Researcher: ...