First published: Fri Apr 16 2004(Updated: )
Stack-based buffer overflow in the RT3 plugin, as used in RealPlayer 8, RealOne Player, RealOne Player 10 beta, and RealOne Player Enterprise, allows remote attackers to execute arbitrary code via a malformed .R3T file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealNetworks RealPlayer | ||
RealNetworks RealPlayer | ||
RealNetworks RealPlayer | =10_beta | |
RealPlayer | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0387 is rated as a critical vulnerability due to its potential for allowing remote attackers to execute arbitrary code.
To mitigate CVE-2004-0387, users should update to the latest version of RealPlayer that addresses this vulnerability.
CVE-2004-0387 affects RealPlayer 8, RealOne Player, and other versions listed in the vulnerability description.
CVE-2004-0387 is classified as a stack-based buffer overflow vulnerability.
Yes, CVE-2004-0387 can be exploited remotely through the use of a specially crafted .R3T file.