First published: Wed Jan 19 2005(Updated: )
Off-by-one buffer overflow in the processing of tags in Real Metadata Package (RMP) files in RealPlayer 10.5 (6.0.12.1040) and earlier could allow remote attackers to execute arbitrary code via a long tag.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealPlayer | =10.5_6.0.12.1016_beta | |
RealNetworks RealPlayer | =2.0 | |
RealPlayer | =10.0_beta | |
RealNetworks RealPlayer | =1.0 | |
RealPlayer | =10.0_6.0.12.690 | |
RealPlayer | =10.5 | |
RealPlayer | =10.5_6.0.12.1040 | |
RealPlayer | =10.0 | |
RealPlayer | =10.0 | |
RealPlayer | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0191 is classified as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2005-0191, users should update RealPlayer to a version that is not vulnerable, specifically versions later than 10.5_6.0.12.1040.
CVE-2005-0191 affects RealPlayer 10.5 and earlier versions, including specific beta releases and RealOne Player 1.0 and 2.0.
CVE-2005-0191 is an off-by-one buffer overflow vulnerability occurring in the processing of tags in RMP files.
Yes, CVE-2005-0191 can be exploited remotely through malicious RMP files containing long tags.