First published: Wed Sep 03 2003(Updated: )
Buffer overflow in the RTSP protocol parser for the View Source plug-in (vsrcplin.so or vsrcplin3260.dll) for RealNetworks Helix Universal Server 9 and RealSystem Server 8, 7 and RealServer G2 allows remote attackers to execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealNetworks RealServer | =7.0 | |
RealNetworks Helix Universal Server | =9.0 | |
RealNetworks RealServer | =8.0.1 | |
RealNetworks RealServer | =g2_1.0 | |
RealNetworks Helix Universal Server | =8.0.1 | |
RealNetworks RealServer | =8.0_beta | |
RealNetworks RealServer | =8.0.2 | |
RealNetworks Helix Universal Server | =9.0.1 | |
RealNetworks Helix Universal Server | =9.0.2.794 | |
RealNetworks RealServer | =7.0.1 | |
RealNetworks RealServer | =8.0 | |
RealNetworks RealServer | =7.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0725 is classified as a critical vulnerability that allows remote attackers to execute arbitrary code.
To mitigate CVE-2003-0725, you should update to the latest version of RealNetworks Helix Universal Server or RealServer that addresses this buffer overflow.
CVE-2003-0725 affects RealNetworks Helix Universal Server versions 8.0.1 and 9.0, as well as various versions of RealServer including 7.0 to 8.0.2.
CVE-2003-0725 is caused by a buffer overflow in the RTSP protocol parser of the View Source plug-in.
Yes, CVE-2003-0725 can be exploited remotely, allowing attackers to run arbitrary code without authentication.