First published: Wed Oct 06 2004(Updated: )
Stack-based buffer overflow in the HandleAction function in RealPlayer 10.5 (6.0.12.1040) and earlier allows remote attackers to execute arbitrary code via a long ShowPreferences argument.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealNetworks RealPlayer | =1.0 | |
RealNetworks RealPlayer | =2.0 | |
RealPlayer | =10.0 | |
RealPlayer | =10.0 | |
RealPlayer | =10.0 | |
RealPlayer | =10.0_6.0.12.690 | |
RealPlayer | =10.0_beta | |
RealPlayer | =10.5 | |
RealPlayer | =10.5_6.0.12.1016_beta | |
RealPlayer | =10.5_6.0.12.1040 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0189 is considered high severity due to the potential for remote code execution.
To fix CVE-2005-0189, update your RealPlayer to version 10.5 or later, which addresses the buffer overflow vulnerability.
CVE-2005-0189 affects RealPlayer versions 10.5 and earlier, including specific RealOne Player versions.
CVE-2005-0189 is a stack-based buffer overflow vulnerability.
Yes, CVE-2005-0189 can be exploited remotely by sending a specially crafted argument to the HandleAction function.