Heap-based buffer overflow in rtffplin.cpp in RealPlayer 10.5 6.0.12.1056 on Windows, and 10, 10.0.1.436, and other versions before 10.0.5 on Linux, allows remote attackers to execute arbitrary code via a RealMedia file with a long RealText string, such as an SMIL file.
References
Configurations
History
20 Nov 2024, 23:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/16981 - | |
References | () http://service.real.com/help/faq/security/050623_player/EN/ - Patch | |
References | () http://www.debian.org/security/2005/dsa-826 - Patch, Vendor Advisory | |
References | () http://www.idefense.com/application/poi/display?id=250&type=vulnerabilities&flashstatus=true - Vendor Advisory | |
References | () http://www.novell.com/linux/security/advisories/2005_37_real_player.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2005-517.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2005-523.html - Vendor Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9509 - |
Information
Published : 2005-06-28 04:00
Updated : 2024-11-20 23:58
NVD link : CVE-2005-1766
Mitre link : CVE-2005-1766
CVE.ORG link : CVE-2005-1766
JSON object : View
Products Affected
realnetworks
- realplayer
CWE