Multiple integer overflows in the ParseKnownType function in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1.4 on Windows allow remote attackers to execute arbitrary code via crafted (1) HX_FLV_META_AMF_TYPE_MIXEDARRAY or (2) HX_FLV_META_AMF_TYPE_ARRAY data in an FLV file.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/41096 - | |
References | () http://secunia.com/advisories/41154 - | |
References | () http://service.real.com/realplayer/security/08262010_player/en/ - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/513383/100/0/threaded - | |
References | () http://www.securitytracker.com/id?1024370 - | |
References | () http://www.vupen.com/english/advisories/2010/2216 - | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-10-167 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/61423 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6651 - |
Information
Published : 2010-08-30 20:00
Updated : 2024-11-21 01:17
NVD link : CVE-2010-3000
Mitre link : CVE-2010-3000
CVE.ORG link : CVE-2010-3000
JSON object : View
Products Affected
realnetworks
- realplayer_sp
- realplayer
microsoft
- windows
CWE
CWE-189
Numeric Errors