First published: Sun Jun 26 2005(Updated: )
Heap-based buffer overflow in vidplin.dll in RealPlayer 10 and 10.5 (6.0.12.1040 through 1069), RealOne Player v1 and v2, RealPlayer 8 and RealPlayer Enterprise allows remote attackers to execute arbitrary code via an .avi file with a modified strf structure value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealPlayer | =10.5_6.0.12.1069 | |
RealPlayer | =10.0 | |
RealNetworks RealPlayer | =2.0 | |
RealPlayer | =8.0 | |
RealNetworks RealPlayer | =1.0 | |
RealPlayer | =10.5_6.0.12.1040 | |
RealPlayer |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2052 is classified as a high severity vulnerability due to its potential for remote attackers to execute arbitrary code.
To fix CVE-2005-2052, users should upgrade to a patched version of RealPlayer or uninstall affected versions of the software.
CVE-2005-2052 affects RealPlayer versions 10.0, 10.5 (up to 10.5_6.0.12.1069), RealOne Player versions 1.0 and 2.0, as well as RealPlayer 8.0.
CVE-2005-2052 is a heap-based buffer overflow vulnerability.
Yes, CVE-2005-2052 can be exploited through an .avi file with a modified strf structure value.