First published: Tue Apr 20 2010(Updated: )
Integer overflow in the AgentX::receive_agentx function in AgentX++ 1.4.16, as used in RealNetworks Helix Server and Helix Mobile Server 11.x through 13.x and other products, allows remote attackers to execute arbitrary code via a request with a crafted payload length.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealNetworks Helix Server | =11.0 | |
Realnetworks Helix Server Mobile | =12.0.0 | |
Realnetworks Helix Server Mobile | =13.0.0 | |
RealNetworks Helix Server | =11.1 | |
Realnetworks Helix Mobile Server | <=13.1.1 | |
RealNetworks Helix Server | =12.0.1 | |
Realnetworks Helix Server Mobile | =11.0 | |
RealNetworks Helix Server | <=13.1.1 | |
RealNetworks Helix Server | =12.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1319 is classified as a high severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2010-1319, update to the latest version of affected RealNetworks Helix Server or Helix Mobile Server software.
CVE-2010-1319 affects RealNetworks Helix Server versions 11.0 to 13.1.1 and Helix Mobile Server versions 11.0 to 13.1.1.
Yes, CVE-2010-1319 can be exploited remotely through crafted payloads sent to the AgentX::receive_agentx function.
CVE-2010-1319 impacts RealNetworks Helix Server and Helix Mobile Server products.