First published: Tue Dec 14 2010(Updated: )
Heap-based buffer overflow in the cook codec in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, and Linux RealPlayer 11.0.2.1744 allows remote attackers to execute arbitrary code via unspecified data in the initialization buffer.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Realnetworks Realplayer | =11.0 | |
Realnetworks Realplayer | =11.0.4 | |
Realnetworks Realplayer | =11.0.2 | |
Realnetworks Realplayer | =11.0.3 | |
Realnetworks Realplayer | =11.0.5 | |
Realnetworks Realplayer | =11.1 | |
Realnetworks Realplayer | =11.0.1 | |
Realnetworks Realplayer Sp | =1.0.1 | |
Realnetworks Realplayer Sp | =1.1.5 | |
Realnetworks Realplayer Sp | =1.1.3 | |
Realnetworks Realplayer Sp | =1.0.0 | |
Realnetworks Realplayer Sp | =1.0.2 | |
Realnetworks Realplayer Sp | =1.1 | |
Realnetworks Realplayer Sp | =1.1.2 | |
Realnetworks Realplayer Sp | =1.1.4 | |
Realnetworks Realplayer Sp | =1.1.1 | |
Realnetworks Realplayer Sp | =1.0.5 | |
Realnetworks Realplayer | =11.0.2.1744 | |
Linux Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.