First published: Tue Apr 20 2010(Updated: )
Stack-based buffer overflow in the AgentX::receive_agentx function in AgentX++ 1.4.16, as used in RealNetworks Helix Server and Helix Mobile Server 11.x through 13.x and other products, allows remote attackers to execute arbitrary code via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealNetworks Helix Server | =11.0 | |
Realnetworks Helix Server Mobile | =12.0.0 | |
Realnetworks Helix Server Mobile | =13.0.0 | |
RealNetworks Helix Server | =11.1 | |
Realnetworks Helix Mobile Server | <=13.1.1 | |
RealNetworks Helix Server | =12.0.1 | |
Realnetworks Helix Server Mobile | =11.0 | |
RealNetworks Helix Server | <=13.1.1 | |
RealNetworks Helix Server | =12.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1318 has a severity rating of high due to the potential for remote code execution.
To fix CVE-2010-1318, upgrade to a patched version of the affected RealNetworks Helix Server or Helix Mobile Server.
CVE-2010-1318 affects RealNetworks Helix Server versions 11.0 to 13.1.1 and Helix Mobile Server up to 13.1.1.
CVE-2010-1318 is a stack-based buffer overflow that allows remote attackers to execute arbitrary code.
Mitigation of CVE-2010-1318 can be achieved by disabling unused services and ensuring proper network segmentation.