First published: Tue Dec 14 2010(Updated: )
Array index error in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer Enterprise 2.1.2, Mac RealPlayer 11.0 through 11.1, Linux RealPlayer 11.0.2.1744, and possibly HelixPlayer 1.0.6 and other versions, allows remote attackers to execute arbitrary code via a malformed Media Properties Header (aka MDPR) in a RealMedia file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealPlayer | =11.0 | |
RealPlayer | =11.0.4 | |
RealPlayer | =11.0.2 | |
RealPlayer | =11.0.3 | |
RealPlayer | =11.0.5 | |
RealPlayer | =11.1 | |
RealPlayer | =11.0.1 | |
RealPlayer | =2.1.2 | |
macOS Yosemite | ||
RealPlayer | =11.0.2.1744 | |
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4384 has a critical severity rating as it allows remote code execution.
To fix CVE-2010-4384, you should update RealPlayer to the latest version provided by RealNetworks.
CVE-2010-4384 affects RealPlayer versions 11.0 through 11.1 and RealPlayer Enterprise 2.1.2.
You can confirm vulnerability by checking if your version of RealPlayer is within the affected versions listed for CVE-2010-4384.
There are no recommended workarounds for CVE-2010-4384, and users should upgrade to eliminate the vulnerability.