First published: Thu Jan 17 2008(Updated: )
Buffer overflow in the RTSPProtocol::HandleSetParameterRequest function in client/core/rtspprotocol.cpp in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted RTSP SET_PARAMETER request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealPlayer | =11.0.1 | |
RealNetworks Helix Player Linux | =11.0.1 | |
RealPlayer | =10.0 | |
RealNetworks Helix Player Linux | =11.0.0 | |
RealNetworks Helix Player Linux | =10.0 | |
RealPlayer | =11.0.0 | |
RealPlayer | =10.0 | |
RealPlayer | =10.5 | |
RealPlayer | =11.0 | |
RealPlayer | =11.0.1 | |
RealPlayer | =11.0.2 | |
RealPlayer | =11.0.3 | |
RealPlayer | =11.0.4 | |
RealPlayer | =11.0.5 | |
RealPlayer | ||
RealPlayer | =1.0.0 | |
RealPlayer | =1.0.1 | |
Microsoft Windows | ||
RealPlayer | =10.1 | |
macOS Yosemite |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4248 is classified as a high severity vulnerability due to its potential to execute arbitrary code.
To fix CVE-2009-4248, update to the latest version of RealPlayer or Helix Player provided by RealNetworks.
CVE-2009-4248 affects RealPlayer versions 10, 10.5, and 11 up to 11.0.4 on various platforms.
CVE-2009-4248 is a buffer overflow vulnerability that occurs in the RTSPProtocol::HandleSetParameterRequest function.
Yes, CVE-2009-4248 can be exploited remotely via malicious RTSP requests.