First published: Thu Jan 17 2008(Updated: )
Buffer overflow in the RTSPProtocol::HandleSetParameterRequest function in client/core/rtspprotocol.cpp in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted RTSP SET_PARAMETER request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Realnetworks Realplayer | =10.0 | |
Realnetworks Realplayer | =10.5 | |
Realnetworks Realplayer | =11.0 | |
Realnetworks Realplayer | =11.0.1 | |
Realnetworks Realplayer | =11.0.2 | |
Realnetworks Realplayer | =11.0.3 | |
Realnetworks Realplayer | =11.0.4 | |
Realnetworks Realplayer | =11.0.5 | |
Realnetworks Realplayer Enterprise | ||
Realnetworks Realplayer Sp | =1.0.0 | |
Realnetworks Realplayer Sp | =1.0.1 | |
Microsoft Windows | ||
Realnetworks Realplayer | =10.1 | |
Apple Mac OS X | ||
Realnetworks Helix Player | =10.0 | |
Realnetworks Helix Player | =11.0.0 | |
Realnetworks Helix Player | =11.0.1 | |
Realnetworks Realplayer | =10.0 | |
Realnetworks Realplayer | =11.0.0 | |
Realnetworks Realplayer | =11.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.