9.3
CVSSv2

CVE-2009-4247

Published: 25/01/2010 Updated: 19/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in protocol/rtsp/rtspclnt.cpp in RealNetworks RealPlayer 10; RealPlayer 10.5 6.0.12.1040 up to and including 6.0.12.1741; RealPlayer 11 11.0.x; RealPlayer SP 1.0.0 and 1.0.1; RealPlayer Enterprise; Mac RealPlayer 10, 10.1, 11.0, and 11.0.1; Linux RealPlayer 10, 11.0.0, and 11.0.1; and Helix Player 10.x, 11.0.0, and 11.0.1 allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via an ASM RuleBook with a large number of rules, related to an "array overflow."

Vulnerable Product Search on Vulmon Subscribe to Product

realnetworks realplayer 11.0.5

realnetworks realplayer 11.0

realnetworks realplayer 11.0.1

realnetworks realplayer 11.0.2

realnetworks realplayer_enterprise

realnetworks realplayer_sp 1.0.0

realnetworks realplayer_sp 1.0.1

realnetworks realplayer 10.5

realnetworks realplayer 10.0

realnetworks realplayer 11.0.3

realnetworks realplayer 11.0.4

realnetworks realplayer 10.1

realnetworks realplayer 11.0.0

realnetworks helix player 10.0

realnetworks helix player 11.0.1

realnetworks helix player 11.0.0

Vendor Advisories

Synopsis Critical: HelixPlayer security update Type/Severity Security Advisory: Critical Topic An updated HelixPlayer package that fixes several security issues is nowavailable for Red Hat Enterprise Linux 4This update has been rated as having critical security impact by the RedHat Security Response Team ...