First published: Wed Mar 02 2005(Updated: )
Heap-based buffer overflow in RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1, allows remote attackers to execute arbitrary code via .WAV files.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
RealNetworks Helix Player Linux | ||
RealNetworks RealPlayer | =1.0 | |
RealNetworks RealPlayer | =2.0 | |
RealPlayer | ||
RealPlayer | =8.0 | |
RealPlayer | =10.0 | |
RealPlayer | =10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0611 is considered critical due to the potential for remote code execution.
To fix CVE-2005-0611, update RealPlayer to the latest version as specified by the vendor.
CVE-2005-0611 affects RealPlayer versions 10.5 and earlier, RealOne Player versions 1.0 and 2.0, as well as various Helix Player versions.
Yes, CVE-2005-0611 can be exploited remotely through malicious .WAV files.
CVE-2005-0611 is a heap-based buffer overflow vulnerability.