First published: Wed Oct 31 2007(Updated: )
Heap-based buffer overflow in RealNetworks RealPlayer 10.0, 10.1, and possibly 10.5, RealOne Player, and RealPlayer Enterprise allows remote attackers to execute arbitrary code via an SWF (Flash) file with malformed record headers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealNetworks RealPlayer | ||
RealNetworks RealPlayer | =2.0 | |
RealPlayer | =10.0 | |
RealPlayer | =10.0-10.0.0.305 | |
RealPlayer | =10.0-10.0.0.331 | |
RealPlayer | =10.0-10.0.0.352 | |
RealPlayer | =10.0-10.0.5 | |
RealPlayer | =10.0-10.0.6 | |
RealPlayer | =10.0-10.0.7 | |
RealPlayer | =10.0-10.0.8 | |
RealPlayer | =10.0-10.0.9 | |
RealPlayer | =10.1-10.0.0.396 | |
RealPlayer | =10.1-10.0.0.412 | |
RealPlayer | =10.5-6.0.12.1040 | |
RealPlayer | =10.5-6.0.12.1578 | |
RealPlayer | =10.5-6.0.12.1698 | |
RealPlayer | =10.5-6.0.12.1741 | |
RealPlayer |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2263 is classified as a critical vulnerability due to its potential to allow remote attackers to execute arbitrary code.
To mitigate CVE-2007-2263, users should update RealPlayer to the latest version provided by RealNetworks.
CVE-2007-2263 affects RealPlayer versions 10.0, 10.1, and 10.5, as well as RealOne Player and RealPlayer Enterprise.
CVE-2007-2263 is a heap-based buffer overflow vulnerability.
Yes, CVE-2007-2263 can be exploited remotely through specially crafted SWF files.