CVE-2005-2629

Integer overflow in RealNetworks RealPlayer 8, 10, and 10.5, RealOne Player 1 and 2, and Helix Player 10.0.0 allows remote attackers to execute arbitrary code via an .rm movie file with a large value in the length field of the first data packet, which leads to a stack-based buffer overflow, a different vulnerability than CVE-2004-1481.
References
Link Resource
http://marc.info/?l=bugtraq&m=113166476423021&w=2
http://secunia.com/advisories/17514/ Patch Vendor Advisory
http://secunia.com/advisories/17559
http://secunia.com/advisories/17860 Patch Vendor Advisory
http://securityreason.com/securityalert/169
http://securitytracker.com/id?1015184
http://securitytracker.com/id?1015185
http://securitytracker.com/id?1015186
http://service.real.com/help/faq/security/051110_player/EN/ Patch
http://www.debian.org/security/2005/dsa-915 Patch Vendor Advisory
http://www.eeye.com/html/research/advisories/AD20051110a.html Patch Vendor Advisory
http://www.securityfocus.com/bid/15381/
https://exchange.xforce.ibmcloud.com/vulnerabilities/23024
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9550
http://marc.info/?l=bugtraq&m=113166476423021&w=2
http://secunia.com/advisories/17514/ Patch Vendor Advisory
http://secunia.com/advisories/17559
http://secunia.com/advisories/17860 Patch Vendor Advisory
http://securityreason.com/securityalert/169
http://securitytracker.com/id?1015184
http://securitytracker.com/id?1015185
http://securitytracker.com/id?1015186
http://service.real.com/help/faq/security/051110_player/EN/ Patch
http://www.debian.org/security/2005/dsa-915 Patch Vendor Advisory
http://www.eeye.com/html/research/advisories/AD20051110a.html Patch Vendor Advisory
http://www.securityfocus.com/bid/15381/
https://exchange.xforce.ibmcloud.com/vulnerabilities/23024
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9550
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:realnetworks:helix_player:1.0:*:linux:*:*:*:*:*
cpe:2.3:a:realnetworks:helix_player:1.0.1:*:linux:*:*:*:*:*
cpe:2.3:a:realnetworks:helix_player:1.0.2:*:linux:*:*:*:*:*
cpe:2.3:a:realnetworks:helix_player:1.0.3:*:linux:*:*:*:*:*
cpe:2.3:a:realnetworks:helix_player:1.0.4:*:linux:*:*:*:*:*
cpe:2.3:a:realnetworks:helix_player:1.0.5:*:linux:*:*:*:*:*
cpe:2.3:a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realplayer:*:*:enterprise:*:*:*:*:*
cpe:2.3:a:realnetworks:realplayer:8.0:*:win32:*:*:*:*:*
cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realplayer:10.0:*:linux:*:*:*:*:*
cpe:2.3:a:realnetworks:realplayer:10.0:*:mac_os_x:*:*:*:*:*
cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1040:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1053:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1056:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1059:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1069:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1235:*:*:*:*:*:*:*

History

21 Nov 2024, 00:00

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=113166476423021&w=2 - () http://marc.info/?l=bugtraq&m=113166476423021&w=2 -
References () http://secunia.com/advisories/17514/ - Patch, Vendor Advisory () http://secunia.com/advisories/17514/ - Patch, Vendor Advisory
References () http://secunia.com/advisories/17559 - () http://secunia.com/advisories/17559 -
References () http://secunia.com/advisories/17860 - Patch, Vendor Advisory () http://secunia.com/advisories/17860 - Patch, Vendor Advisory
References () http://securityreason.com/securityalert/169 - () http://securityreason.com/securityalert/169 -
References () http://securitytracker.com/id?1015184 - () http://securitytracker.com/id?1015184 -
References () http://securitytracker.com/id?1015185 - () http://securitytracker.com/id?1015185 -
References () http://securitytracker.com/id?1015186 - () http://securitytracker.com/id?1015186 -
References () http://service.real.com/help/faq/security/051110_player/EN/ - Patch () http://service.real.com/help/faq/security/051110_player/EN/ - Patch
References () http://www.debian.org/security/2005/dsa-915 - Patch, Vendor Advisory () http://www.debian.org/security/2005/dsa-915 - Patch, Vendor Advisory
References () http://www.eeye.com/html/research/advisories/AD20051110a.html - Patch, Vendor Advisory () http://www.eeye.com/html/research/advisories/AD20051110a.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/15381/ - () http://www.securityfocus.com/bid/15381/ -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/23024 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/23024 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9550 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9550 -

Information

Published : 2005-11-18 23:03

Updated : 2024-11-21 00:00


NVD link : CVE-2005-2629

Mitre link : CVE-2005-2629

CVE.ORG link : CVE-2005-2629


JSON object : View

Products Affected

realnetworks

  • helix_player
  • realone_player
  • realplayer