First published: Mon Apr 04 2011(Updated: )
Stack-based buffer overflow in RealNetworks Helix Server 12.x, 13.x, and 14.x before 14.2, and Helix Mobile Server 12.x, 13.x, and 14.x before 14.2, allows remote attackers to execute arbitrary code via a long string in an RTSP request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealNetworks Helix Server | =13.1.1 | |
RealNetworks Helix Server | =14.0.0 | |
RealNetworks Helix Server | =13.0.0 | |
RealNetworks Helix Server | =12.0.1 | |
RealNetworks Helix Server | =14.0.1 | |
RealNetworks Helix Server | =12.0.0 | |
Realnetworks Helix Mobile Server | =14.0.1 | |
Realnetworks Helix Mobile Server | =13.1.1 | |
Realnetworks Helix Mobile Server | =12.0 | |
Realnetworks Helix Mobile Server | =14.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4596 is considered to have a high severity due to its potential for remote code execution.
To fix CVE-2010-4596, upgrade the RealNetworks Helix Server or Helix Mobile Server to version 14.2 or later.
CVE-2010-4596 affects RealNetworks Helix Server versions 12.x to 14.1 and Helix Mobile Server versions 12.x to 14.1.
Yes, CVE-2010-4596 can be exploited remotely through crafted RTSP requests.
Exploitation of CVE-2010-4596 may lead to arbitrary code execution, allowing attackers to compromise affected systems.