First published: Mon Jan 25 2010(Updated: )
Stack-based buffer overflow in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows user-assisted remote attackers to execute arbitrary code via a malformed .RJS skin file that contains a web.xmb file with crafted length values.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealPlayer | =11.0.1 | |
RealNetworks Helix Player Linux | =11.0.1 | |
RealPlayer | =10.0 | |
RealNetworks Helix Player Linux | =11.0.0 | |
RealNetworks Helix Player Linux | =10.0 | |
RealPlayer | =11.0.0 | |
RealPlayer | =10.0 | |
RealPlayer | =10.5 | |
RealPlayer | =11.0 | |
RealPlayer | =11.0.1 | |
RealPlayer | =11.0.2 | |
RealPlayer | =11.0.3 | |
RealPlayer | =11.0.4 | |
RealPlayer | =11.0.5 | |
RealPlayer | ||
RealPlayer | =1.0.0 | |
RealPlayer | =1.0.1 | |
Microsoft Windows | ||
RealPlayer | =10.1 | |
macOS Yosemite |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4246 has a high severity rating due to its potential for remote code execution.
To mitigate CVE-2009-4246, upgrade to a patched version of RealPlayer or Helix Player.
CVE-2009-4246 affects RealPlayer 10 through 11.0.4 and Helix Player versions prior to 11.0.1.
CVE-2009-4246 primarily affects Linux-based installations of RealPlayer and Helix Player.
Yes, CVE-2009-4246 can enable remote attackers to execute arbitrary code with user assistance, leading to unauthorized access.