First published: Sat Dec 31 2005(Updated: )
Heap-based buffer overflow in the embedded player in multiple RealNetworks products and versions including RealPlayer 10.x, RealOne Player, and Helix Player allows remote malicious servers to cause a denial of service (crash) and possibly execute arbitrary code via a chunked Transfer-Encoding HTTP response in which either (1) the chunk header length is specified as -1, (2) the chunk header with a length that is less than the actual amount of sent data, or (3) a missing chunk header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Realnetworks Helix Player | =10.0 | |
Realnetworks Helix Player | =10.0.1 | |
Realnetworks Helix Player | =10.0.2 | |
Realnetworks Helix Player | =10.0.3 | |
Realnetworks Helix Player | =10.0.4 | |
Realnetworks Helix Player | =10.0.5 | |
Realnetworks Helix Player | =10.0.6 | |
Realnetworks Realone Player | ||
Realnetworks Realone Player | =0.288 | |
Realnetworks Realone Player | =0.297 | |
Realnetworks Realone Player | =1.0 | |
Realnetworks Realone Player | =2.0 | |
Realnetworks Realplayer | ||
Realnetworks Realplayer | =8.0 | |
Realnetworks Realplayer | =10.0 | |
Realnetworks Realplayer | =10.0.0.305 | |
Realnetworks Realplayer | =10.0.0.331 | |
Realnetworks Realplayer | =10.0.1 | |
Realnetworks Realplayer | =10.0.2 | |
Realnetworks Realplayer | =10.0.3 | |
Realnetworks Realplayer | =10.0.4 | |
Realnetworks Realplayer | =10.0.5 | |
Realnetworks Realplayer | =10.0.6 | |
Realnetworks Realplayer | =10.5 | |
Realnetworks Realplayer | =10.5_6.0.12.1040 | |
Realnetworks Realplayer | =10.5_6.0.12.1053 | |
Realnetworks Realplayer | =10.5_6.0.12.1056 | |
Realnetworks Realplayer | =10.5_6.0.12.1059 | |
Realnetworks Realplayer | =10.5_6.0.12.1069 | |
Realnetworks Realplayer | =10.5_6.0.12.1235 | |
Realnetworks Rhapsody | =3.0 | |
Realnetworks Rhapsody | =3.0_build_0.815 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.