First published: Wed Feb 03 2010(Updated: )
Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2009-4245">CVE-2009-4245</a> to the following vulnerability: Heap-based buffer overflow in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows remote attackers to have an unspecified impact via a compressed GIF file. References: <a href="http://service.real.com/realplayer/security/01192010_player/en/">http://service.real.com/realplayer/security/01192010_player/en/</a> <a href="http://xforce.iss.net/xforce/xfdb/55800">http://xforce.iss.net/xforce/xfdb/55800</a>
Affected Software | Affected Version | How to fix |
---|---|---|
RealPlayer | >=6.0.12.1040<6.0.12.1741>=11.0.0<11.0.4 | |
RealPlayer | ||
RealNetworks Helix Player Linux | >=10.0<10.x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-561441 is considered high due to the potential for a heap-based buffer overflow leading to remote code execution.
To fix REDHAT-BUG-561441, users should update RealNetworks RealPlayer and Helix Player to the latest patched versions.
REDHAT-BUG-561441 affects RealPlayer versions 6.0.12.1040 to 6.0.12.1741 and RealPlayer 11 versions 11.0.0 to 11.0.4.
The impacted platforms include RealNetworks RealPlayer, RealPlayer Enterprise, and Helix Player on Linux.
Temporary workarounds for REDHAT-BUG-561441 may include disabling the use of RealPlayer in high-security environments until updates are applied.