Computer Security
[EN] securityvulns.ru no-pyccku


RealPlayer buffer overflow
Published:28.10.2012
Source:
SecurityVulns ID:12673
Type:local
Threat Level:
4/10
Description:Buffer overflow on oversized filename in wathced folder.
Affected:REAL : Realplayer 15.0
CVE:CVE-2012-4987 (Stack-based buffer overflow in RealNetworks RealPlayer 15.0.5.109 allows user-assisted remote attackers to execute arbitrary code via a crafted ZIP file that triggers incorrect processing of long pathnames by the Watch Folders feature.)
Original documentdocumentJoseph Sheridan, Realplayer Watchfolders Long Filepath Overflow (28.10.2012)
Files:REALPLAYER WATCHFOLDERS LONG FILEPATH OVERFLOW

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod