ID CVE-2002-1643
Summary Multiple buffer overflows in RealNetworks Helix Universal Server 9.0 (9.0.2.768) allow remote attackers to execute arbitrary code via (1) a long Transport field in a SETUP RTSP request, (2) a DESCRIBE RTSP request with a long URL argument, or (3) two simultaneous HTTP GET requests with long arguments.
References
Vulnerable Configurations
  • cpe:2.3:a:realnetworks:helix_universal_server:9.0:*:*:*:*:*:*:*
    cpe:2.3:a:realnetworks:helix_universal_server:9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:realnetworks:helix_universal_server:9.0.2.768:*:*:*:*:*:*:*
    cpe:2.3:a:realnetworks:helix_universal_server:9.0.2.768:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 23-12-2017 - 02:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid
  • 6454
  • 6456
  • 6458
bugtraq 20021220 RealNetworks HELIX Server Buffer Overflow Vulnerabilities (#NISR20122002)
cert-vn VU#974689
confirm http://www.service.real.com/help/faq/security/bufferoverrun12192002.html
misc http://www.nextgenss.com/advisories/realhelix.txt
xf
  • helix-http-get-bo(10917)
  • helix-rtsp-describe-bo(10916)
  • helix-rtsp-setup-bo(10915)
Last major update 23-12-2017 - 02:29
Published 19-12-2002 - 05:00
Last modified 23-12-2017 - 02:29
Back to Top