9.3
CVSSv2

CVE-2009-4248

Published: 25/01/2010 Updated: 19/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in the RTSPProtocol::HandleSetParameterRequest function in client/core/rtspprotocol.cpp in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 up to and including 6.0.12.1741, RealPlayer 11 11.0.0 up to and including 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted RTSP SET_PARAMETER request.

Vulnerable Product Search on Vulmon Subscribe to Product

realnetworks realplayer_sp 1.0.1

realnetworks realplayer 11.0.1

realnetworks realplayer 10.0

realnetworks realplayer_enterprise

realnetworks realplayer 11.0.4

realnetworks realplayer 11.0.5

realnetworks realplayer 11.0.2

realnetworks realplayer 11.0.3

realnetworks realplayer_sp 1.0.0

realnetworks realplayer 11.0

realnetworks realplayer 10.5

realnetworks realplayer 10.1

realnetworks helix player 11.0.0

realnetworks helix player 10.0

realnetworks realplayer 11.0.0

realnetworks helix player 11.0.1

Vendor Advisories

Synopsis Critical: HelixPlayer security update Type/Severity Security Advisory: Critical Topic An updated HelixPlayer package that fixes several security issues is nowavailable for Red Hat Enterprise Linux 4This update has been rated as having critical security impact by the RedHat Security Response Team ...