First published: Tue Sep 16 2008(Updated: )
Heap-based buffer overflow in datatype/smil/common/smlpkt.cpp in smlrender.dll in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10 and 11.0.0, and Helix Player 10.x and 11.0.0 allows remote attackers to execute arbitrary code via an SMIL file with crafted string lengths.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealPlayer | =11.0.1 | |
RealNetworks Helix Player Linux | =11.0.1 | |
RealPlayer | =10.0 | |
RealNetworks Helix Player Linux | =11.0.0 | |
RealNetworks Helix Player Linux | =10.0 | |
RealPlayer | =11.0.0 | |
RealPlayer | =10.0 | |
RealPlayer | =10.5 | |
RealPlayer | =11.0 | |
RealPlayer | =11.0.1 | |
RealPlayer | =11.0.2 | |
RealPlayer | =11.0.3 | |
RealPlayer | =11.0.4 | |
RealPlayer | =11.0.5 | |
RealPlayer | ||
RealPlayer | =1.0.0 | |
RealPlayer | =1.0.1 | |
Microsoft Windows Operating System | ||
RealPlayer | =10.1 | |
Apple iOS and macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4257 is considered a critical vulnerability due to the potential for remote code execution.
To fix CVE-2009-4257, update RealPlayer to the latest version provided by RealNetworks.
CVE-2009-4257 affects RealPlayer versions 10.0, 10.5, and 11.0 through 11.0.4, as well as Helix Player versions 10.0 and 11.0.0.
Yes, CVE-2009-4257 can be exploited remotely, allowing attackers to execute arbitrary code on affected systems.
Currently, the most effective workaround for CVE-2009-4257 is to uninstall the affected versions of RealPlayer and Helix Player.