Computer Security
[EN] securityvulns.ru no-pyccku


RealPlayer multiple security vulnerabilities
updated since 07.02.2009
Published:07.02.2009
Source:
SecurityVulns ID:9659
Type:client
Threat Level:
6/10
Description:Multiple vulnerabilities on IVR format parsing.
Affected:REAL : RealPlayer 11
CVE:CVE-2009-0376 (A DLL file in RealNetworks RealPlayer 11 allows remote attackers to execute arbitrary code via a crafted Internet Video Recording (IVR) file with a modified field that controls an unspecified structure length and triggers heap corruption, related to use of RealPlayer through a Windows Explorer plugin.)
 CVE-2009-0375 (A DLL file in RealNetworks RealPlayer 11 allows remote attackers to execute arbitrary code via a crafted Internet Video Recording (IVR) file with a filename length field containing a large integer, which triggers overwrite of an arbitrary memory location with a 0x00 byte value, related to use of RealPlayer through a Windows Explorer plugin.)
Original documentdocumentZDI, ZDI-10-009: RealNetworks RealPlayer IVR Format Remote Code Execution Vulnerability (21.01.2010)
 documentnoreply-secresearch_(at)_fortinet.com, RealNetworks RealPlayer IVR File Processing Multiple Code Execute Vulnerabilities (07.02.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod