First published: Wed Mar 02 2005(Updated: )
Stack-based buffer overflow in the CSmil1Parser::testAttributeFailed function in smlparse.cpp for RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1 allows remote attackers to execute arbitrary code via a .SMIL file with a large system-screen-size value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealPlayer | =10.0 | |
RealPlayer | =10.5_6.0.12.1016_beta | |
RealNetworks RealPlayer | =2.0 | |
RealPlayer | =8.0 | |
RealPlayer | =10.0_beta | |
RealPlayer | =10.5_6.0.12.1053 | |
RealPlayer | =8.0 | |
RealNetworks RealPlayer | =1.0 | |
RealPlayer | =10.0_6.0.12.690 | |
RealPlayer | =10.5 | |
RealPlayer | =10.5_6.0.12.1040 | |
RealNetworks RealPlayer | =1.0 | |
RealNetworks RealPlayer | =2.0 | |
RealPlayer | =8.0 | |
RealPlayer | =8.0 | |
RealPlayer | =10.0 | |
RealPlayer | =10.0_6.0.12.690 | |
RealPlayer | =10.0_beta | |
RealPlayer | =10.5 | |
RealPlayer | =10.5_6.0.12.1016_beta | |
RealPlayer | =10.5_6.0.12.1040 | |
RealPlayer | =10.5_6.0.12.1053 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0455 is classified as a high severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2005-0455, users should update to a patched version of RealPlayer or apply any available security updates from RealNetworks.
CVE-2005-0455 affects RealPlayer 10.5, 10.0, 8.0, and RealOne Player versions V1 and V2.
CVE-2005-0455 can be exploited through specially crafted .SMIL files that include a large system-screen-size value.
CVE-2005-0455 is a stack-based buffer overflow vulnerability.