First published: Tue Sep 27 2005(Updated: )
Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote attackers to execute arbitrary code via the (1) image handle or (2) timeformat attribute in a RealPix (.rp) or RealText (.rt) file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealNetworks Helix Player Linux | ||
RealPlayer | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2710 has a high severity level due to its potential for remote code execution.
To fix CVE-2005-2710, update to the latest versions of Real HelixPlayer or RealPlayer that patch this vulnerability.
CVE-2005-2710 affects Real HelixPlayer and RealPlayer version 10.0.
CVE-2005-2710 is identified as a format string vulnerability.
Yes, CVE-2005-2710 can be exploited remotely through specially crafted RealPix or RealText files.