ID CVE-2004-0387
Summary Stack-based buffer overflow in the RT3 plugin, as used in RealPlayer 8, RealOne Player, RealOne Player 10 beta, and RealOne Player Enterprise, allows remote attackers to execute arbitrary code via a malformed .R3T file.
References
Vulnerable Configurations
  • cpe:2.3:a:realnetworks:realone_player:*:*:*:*:*:*:*:*
    cpe:2.3:a:realnetworks:realone_player:*:*:*:*:*:*:*:*
  • cpe:2.3:a:realnetworks:realone_player:*:*:enterprise:*:*:*:*:*
    cpe:2.3:a:realnetworks:realone_player:*:*:enterprise:*:*:*:*:*
  • cpe:2.3:a:realnetworks:realone_player:10_beta:*:*:*:*:*:*:*
    cpe:2.3:a:realnetworks:realone_player:10_beta:*:*:*:*:*:*:*
  • cpe:2.3:a:realnetworks:realplayer:8.0:*:*:*:*:*:*:*
    cpe:2.3:a:realnetworks:realplayer:8.0:*:*:*:*:*:*:*
CVSS
Base: 5.1 (as of 11-07-2017 - 01:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:H/Au:N/C:P/I:P/A:P
refmap via4
bid 10070
bugtraq 20040307 REAL One Player R3T File Format Stack Overflow
confirm http://www.service.real.com/help/faq/security/040406_r3t/en/
misc http://www.ngssoftware.com/advisories/realr3t.txt
osvdb 4977
secunia 11314
vulnwatch 20040307 REAL One Player R3T File Format Stack Overflow
xf realplayer-r3t-bo(15774)
Last major update 11-07-2017 - 01:30
Published 01-06-2004 - 04:00
Last modified 11-07-2017 - 01:30
Back to Top