Integer overflow in pnen3260.dll in RealPlayer 8 through 10.5 (6.0.12.1040) and earlier, and RealOne Player 1 or 2 on Windows or Mac OS, allows remote attackers to execute arbitrary code via a SMIL file and a .rm movie file with a large length field for the data chunk, which leads to a heap-based buffer overflow.
References
Link | Resource |
---|---|
http://marc.info/?l=ntbugtraq&m=109708374115061&w=2 | Mailing List Third Party Advisory |
http://secunia.com/advisories/12672 | Third Party Advisory |
http://www.securityfocus.com/bid/11309 | Patch Third Party Advisory VDB Entry |
http://www.service.real.com/help/faq/security/040928_player/EN/ | Broken Link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17549 | Third Party Advisory VDB Entry |
http://marc.info/?l=ntbugtraq&m=109708374115061&w=2 | Mailing List Third Party Advisory |
http://secunia.com/advisories/12672 | Third Party Advisory |
http://www.securityfocus.com/bid/11309 | Patch Third Party Advisory VDB Entry |
http://www.service.real.com/help/faq/security/040928_player/EN/ | Broken Link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17549 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=ntbugtraq&m=109708374115061&w=2 - Mailing List, Third Party Advisory | |
References | () http://secunia.com/advisories/12672 - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/11309 - Patch, Third Party Advisory, VDB Entry | |
References | () http://www.service.real.com/help/faq/security/040928_player/EN/ - Broken Link | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/17549 - Third Party Advisory, VDB Entry |
Information
Published : 2004-12-31 05:00
Updated : 2024-11-20 23:50
NVD link : CVE-2004-1481
Mitre link : CVE-2004-1481
CVE.ORG link : CVE-2004-1481
JSON object : View
Products Affected
realnetworks
- helix_player
- realone_player
- realplayer
CWE