First published: Fri Nov 18 2005(Updated: )
Heap-based buffer overflow in DUNZIP32.DLL for RealPlayer 8, 10, and 10.5 and RealOne Player 1 and 2 allows remote attackers to execute arbitrary code via a crafted RealPlayer Skin (RJS) file, a different vulnerability than CVE-2004-1094.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealPlayer | =10.5_6.0.12.1069 | |
RealPlayer | =10.0 | |
RealNetworks RealPlayer | =2.0 | |
RealPlayer | =8.0 | |
RealPlayer | =10.5_6.0.12.1053 | |
RealPlayer | =10.0 | |
RealNetworks RealPlayer | =1.0 | |
RealPlayer | =10.5_6.0.12.1056 | |
RealPlayer | =10.5_6.0.12.1235 | |
RealPlayer | =10.5_6.0.12.1059 | |
RealPlayer | =10.5 | |
RealPlayer | =10.0 | |
RealPlayer | =10.5_6.0.12.1040 | |
RealPlayer |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2630 is classified as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2005-2630, you should update RealPlayer to the latest version provided by RealNetworks.
CVE-2005-2630 affects RealPlayer 8, 10, 10.5, and RealOne Player versions 1 and 2.
Yes, CVE-2005-2630 can be exploited remotely by sending a crafted RealPlayer Skin (RJS) file.
CVE-2005-2630 is a heap-based buffer overflow that allows attackers to execute arbitrary code.