First published: Tue Dec 14 2010(Updated: )
Use-after-free vulnerability in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.0.1, Mac RealPlayer 11.0 through 11.1, Linux RealPlayer 11.0.2.1744, and possibly HelixPlayer 1.0.6 and other versions, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted StreamTitle tag in an ICY SHOUTcast stream, related to the SMIL file format.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealPlayer | =11.0 | |
RealPlayer | =11.0.4 | |
RealPlayer | =11.0.2 | |
RealPlayer | =11.0.3 | |
RealPlayer | =11.0.5 | |
RealPlayer | =11.1 | |
RealPlayer | =11.0.1 | |
RealNetworks RealPlayer SP | =1.0.1 | |
RealNetworks RealPlayer SP | =1.0.0 | |
RealPlayer | =1.0.0 | |
RealPlayer | =1.0.1 | |
Apple iOS and macOS | ||
RealPlayer | =11.0.2.1744 | |
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2997 is rated as having a critical severity due to the potential for remote code execution.
To fix CVE-2010-2997, update your RealPlayer to the latest version provided by RealNetworks.
CVE-2010-2997 affects RealPlayer versions 11.0 through 11.1 and RealPlayer SP versions 1.0 through 1.0.1.
Yes, CVE-2010-2997 can cause a denial of service besides allowing remote code execution.
You can verify your vulnerability to CVE-2010-2997 by checking the version of RealPlayer installed on your system.