First published: Thu Dec 19 2002(Updated: )
Multiple buffer overflows in RealNetworks Helix Universal Server 9.0 (9.0.2.768) allow remote attackers to execute arbitrary code via (1) a long Transport field in a SETUP RTSP request, (2) a DESCRIBE RTSP request with a long URL argument, or (3) two simultaneous HTTP GET requests with long arguments.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealNetworks Helix Universal Server | =9.0.2.768 | |
RealNetworks Helix Universal Server | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1643 is rated as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2002-1643, users should update to the latest version of RealNetworks Helix Universal Server that addresses the buffer overflow vulnerabilities.
CVE-2002-1643 affects RealNetworks Helix Universal Server version 9.0.2.768 and potentially earlier versions of 9.0.
Yes, CVE-2002-1643 can be exploited remotely through specially crafted RTSP and HTTP requests.
CVE-2002-1643 can be triggered by lengthy Transport fields in SETUP RTSP requests and long URL arguments in DESCRIBE RTSP requests.