First published: Fri Nov 18 2005(Updated: )
Buffer overflow in RealNetworks RealPlayer 10 and 10.5 allows remote attackers to execute arbitrary code via a crafted image in a RealPlayer Skin (RJS) file. NOTE: due to the lack of details, it is unclear how this is different than CVE-2005-2629 and CVE-2005-2630, but the vendor advisory implies that it is different.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealPlayer | =10.0 | |
RealPlayer | =10.5_6.0.12.1040 | |
RealPlayer | =10.5_6.0.12.1053 | |
RealPlayer | =10.5_6.0.12.1056 | |
RealPlayer | =10.5_6.0.12.1059 | |
RealPlayer | =10.5_6.0.12.1069 | |
RealPlayer | =10.5_6.0.12.1235 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3677 has a critical severity rating due to the potential for remote code execution.
To mitigate CVE-2005-3677, it is recommended to upgrade RealPlayer to a secure version that is not vulnerable to this exploit.
CVE-2005-3677 affects RealPlayer versions 10.0 and 10.5, including specific builds of 10.5.
CVE-2005-3677 allows attackers to execute arbitrary code by exploiting a buffer overflow through crafted image files in RealPlayer Skin files.
There are no effective workarounds for CVE-2005-3677; the best course of action is to apply the necessary updates.