First published: Mon Aug 30 2010(Updated: )
Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1.4 on Windows allows remote attackers to execute arbitrary code via large size values in QCP audio content.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
RealPlayer | =11.0 | |
RealPlayer | =11.1 | |
Microsoft Windows Operating System | ||
RealPlayer | =1.0.0 | |
RealPlayer | =1.0.1 | |
RealPlayer | =1.0.2 | |
RealPlayer | =1.0.5 | |
RealPlayer | =1.1 | |
RealPlayer | =1.1.1 | |
RealPlayer | =1.1.2 | |
RealPlayer | =1.1.3 | |
RealPlayer | =1.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0120 has a critical severity rating due to its potential for remote code execution.
To fix CVE-2010-0120, update RealPlayer and RealPlayer SP to the latest available versions.
CVE-2010-0120 affects RealPlayer versions 11.0 to 11.1 and all versions of RealPlayer SP from 1.0 to 1.1.4.
CVE-2010-0120 can be exploited by attackers through specially crafted QCP audio files that trigger buffer overflow conditions.
CVE-2010-0120 specifically affects RealPlayer applications running on Microsoft Windows.