First published: Wed Feb 03 2010(Updated: )
Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2009-4248">CVE-2009-4248</a> to the following vulnerability: Buffer overflow in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows remote attackers to have an unspecified impact via a crafted RTSP SET_PARAMETER request. References: <a href="http://service.real.com/realplayer/security/01192010_player/en/">http://service.real.com/realplayer/security/01192010_player/en/</a> <a href="http://xforce.iss.net/xforce/xfdb/55801">http://xforce.iss.net/xforce/xfdb/55801</a>
Affected Software | Affected Version | How to fix |
---|---|---|
RealPlayer | >=10.0<10.5 6.0.12.1741 | |
RealPlayer | >=11.0.0<11.0.4 | |
RealNetworks Helix Player Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-561361 is classified as a critical vulnerability due to the buffer overflow in RealPlayer that can lead to arbitrary code execution.
To fix REDHAT-BUG-561361, upgrade to the latest version of RealPlayer or apply any patches provided by RealNetworks.
REDHAT-BUG-561361 affects RealPlayer versions 10.0 to 10.5 6.0.12.1741 and 11.0.0 to 11.0.4.
REDHAT-BUG-561361 is a buffer overflow vulnerability that impacts RealNetworks software.
The vulnerability REDHAT-BUG-561361 specifically mentions RealNetworks Helix Player for Linux, indicating it may be affected.