First published: Tue Dec 14 2010(Updated: )
Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.1, Mac RealPlayer 11.0 through 11.1, and Linux RealPlayer 11.0.2.1744 allows remote attackers to execute arbitrary code via a large Screen Width value in the Screen Descriptor header of a GIF87a file in an RTSP stream.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealPlayer | =11.0 | |
RealPlayer | =11.0.4 | |
RealPlayer | =11.0.2 | |
RealPlayer | =11.0.3 | |
RealPlayer | =11.0.5 | |
RealPlayer | =11.1 | |
RealPlayer | =11.0.1 | |
RealNetworks RealPlayer SP | =1.0.1 | |
RealNetworks RealPlayer SP | =1.0.0 | |
RealNetworks RealPlayer SP | =1.0.2 | |
RealNetworks RealPlayer SP | =1.1 | |
RealNetworks RealPlayer SP | =1.1.1 | |
RealNetworks RealPlayer SP | =1.0.5 | |
RealPlayer | =1.0.0 | |
RealPlayer | =1.0.1 | |
RealPlayer | =1.0.2 | |
RealPlayer | =1.0.5 | |
RealPlayer | =1.1 | |
RealPlayer | =1.1.1 | |
macOS Yosemite | ||
RealPlayer | =11.0.2.1744 | |
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4376 has a critical severity rating due to its potential for remote code execution.
To mitigate CVE-2010-4376, upgrade RealPlayer to the latest version provided by RealNetworks.
CVE-2010-4376 affects RealPlayer versions 11.0 through 11.1 and RealPlayer SP versions 1.0 through 1.1.1.
Yes, CVE-2010-4376 can be exploited remotely via specially crafted GIF files.
CVE-2010-4376 can facilitate arbitrary code execution on the affected systems.