First published: Tue Dec 14 2010(Updated: )
Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1.5 allows remote web servers to execute arbitrary code via a long Server header in a response to an HTTP request that occurs during parsing of a RealPix file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealPlayer | =11.0 | |
RealPlayer | =11.0.4 | |
RealPlayer | =11.0.2 | |
RealPlayer | =11.0.3 | |
RealPlayer | =11.0.5 | |
RealPlayer | =11.1 | |
RealPlayer | =11.0.1 | |
RealNetworks RealPlayer SP | =1.0.1 | |
RealNetworks RealPlayer SP | =1.1.5 | |
RealNetworks RealPlayer SP | =1.1.3 | |
RealNetworks RealPlayer SP | =1.0.0 | |
RealNetworks RealPlayer SP | =1.0.2 | |
RealNetworks RealPlayer SP | =1.1 | |
RealNetworks RealPlayer SP | =1.1.2 | |
RealNetworks RealPlayer SP | =1.1.4 | |
RealNetworks RealPlayer SP | =1.1.1 | |
RealNetworks RealPlayer SP | =1.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4394 has been rated as high severity due to its potential for remote code execution.
To fix CVE-2010-4394, users should upgrade to the latest version of RealPlayer that addresses this vulnerability.
CVE-2010-4394 affects RealNetworks RealPlayer versions 11.0 to 11.1 and RealPlayer SP versions 1.0 to 1.1.5.
The main impact of CVE-2010-4394 is that it allows attackers to execute arbitrary code on the affected system via specially crafted HTTP requests.
While there have been reports of exploitation attempts, it is crucial to monitor system logs for any suspicious activity related to CVE-2010-4394.