First published: Mon Aug 30 2010(Updated: )
Integer overflow in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1.4 on Windows might allow remote attackers to execute arbitrary code via a crafted QCP file that triggers a heap-based buffer overflow.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
RealPlayer | =11.0 | |
RealPlayer | =11.1 | |
Microsoft Windows Operating System | ||
RealPlayer | =1.0.0 | |
RealPlayer | =1.0.1 | |
RealPlayer | =1.0.2 | |
RealPlayer | =1.0.5 | |
RealPlayer | =1.1 | |
RealPlayer | =1.1.1 | |
RealPlayer | =1.1.2 | |
RealPlayer | =1.1.3 | |
RealPlayer | =1.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0116 is considered to have a high severity level due to the potential for remote code execution.
To fix CVE-2010-0116, update RealPlayer to a patched version released by RealNetworks.
CVE-2010-0116 affects RealPlayer versions 11.0 through 11.1 and RealPlayer SP versions 1.0 through 1.1.4.
CVE-2010-0116 exploits an integer overflow that triggers a heap-based buffer overflow via a crafted QCP file.
It is not safe to use RealPlayer 11.0 or 11.1 until they are updated to a secure version that addresses CVE-2010-0116.