ID CVE-2005-2710
Summary Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote attackers to execute arbitrary code via the (1) image handle or (2) timeformat attribute in a RealPix (.rp) or RealText (.rt) file.
References
Vulnerable Configurations
  • RealNetworks Helix Player
    cpe:2.3:a:realnetworks:helix_player
  • RealNetworks RealPlayer 10.0
    cpe:2.3:a:realnetworks:realplayer:10.0
CVSS
Base: 5.1 (as of 28-09-2005 - 08:44)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
exploit-db via4
description RealPlayer/Helix Player Remote Format String Exploit (linux). CVE-2005-2710. Remote exploit for linux platform
id EDB-ID:1232
last seen 2016-01-31
modified 2005-09-26
published 2005-09-26
reporter c0ntex
source https://www.exploit-db.com/download/1232/
title RealPlayer/Helix Player Remote Format String Exploit linux
nessus via4
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-826.NASL
    description Multiple security vulnerabilities have been identified in the helix-player media player that could allow an attacker to execute code on the victim's machine via specially crafted network resources. - CAN-2005-1766 Buffer overflow in the RealText parser could allow remote code execution via a specially crafted RealMedia file with a long RealText string. - CAN-2005-2710 Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote attackers to execute arbitrary code via the image handle attribute in a RealPix (.rp) or RealText (.rt) file.
    last seen 2019-02-21
    modified 2018-08-09
    plugin id 19795
    published 2005-10-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19795
    title Debian DSA-826-1 : helix-player - multiple vulnerabilities
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200510-07.NASL
    description The remote host is affected by the vulnerability described in GLSA-200510-07 (RealPlayer, Helix Player: Format string vulnerability) 'c0ntex' reported that RealPlayer and Helix Player suffer from a heap overflow. Impact : By enticing a user to play a specially crafted realpix (.rp) or realtext (.rt) file, an attacker could execute arbitrary code with the permissions of the user running the application. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-08-10
    plugin id 19977
    published 2005-10-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19977
    title GLSA-200510-07 : RealPlayer, Helix Player: Format string vulnerability
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2005-788.NASL
    description An updated HelixPlayer package that fixes a string format issue is now available. This update has been rated as having critical security impact by the Red Hat Security Response Team. HelixPlayer is a media player. A format string bug was discovered in the way HelixPlayer processes RealPix (.rp) files. It is possible for a malformed RealPix file to execute arbitrary code as the user running HelixPlayer. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-2710 to this issue. All users of HelixPlayer are advised to upgrade to this updated package, which contains HelixPlayer version 10.0.6 and is not vulnerable to this issue.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 23983
    published 2007-01-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=23983
    title CentOS 4 : Helix / Player (CESA-2005:788)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2005-788.NASL
    description An updated HelixPlayer package that fixes a string format issue is now available. This update has been rated as having critical security impact by the Red Hat Security Response Team. HelixPlayer is a media player. A format string bug was discovered in the way HelixPlayer processes RealPix (.rp) files. It is possible for a malformed RealPix file to execute arbitrary code as the user running HelixPlayer. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-2710 to this issue. All users of HelixPlayer are advised to upgrade to this updated package, which contains HelixPlayer version 10.0.6 and is not vulnerable to this issue.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 19836
    published 2005-10-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19836
    title RHEL 4 : HelixPlayer (RHSA-2005:788)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2005-762.NASL
    description An updated RealPlayer package that fixes a format string bug is now available. This update has been rated as having critical security impact by the Red Hat Security Response Team. RealPlayer is a media player that provides media playback locally and via streaming. A format string bug was discovered in the way RealPlayer processes RealPix (.rp) files. It is possible for a malformed RealPix file to execute arbitrary code as the user running RealPlayer. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-2710 to this issue. All users of RealPlayer are advised to upgrade to this updated package, which contains RealPlayer version 10.0.6 and is not vulnerable to this issue.
    last seen 2019-02-21
    modified 2014-05-02
    plugin id 63829
    published 2013-01-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=63829
    title RHEL 3 / 4 : RealPlayer (RHSA-2005:762)
oval via4
accepted 2013-04-29T04:10:46.741-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
description Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote attackers to execute arbitrary code via the (1) image handle or (2) timeformat attribute in a RealPix (.rp) or RealText (.rt) file.
family unix
id oval:org.mitre.oval:def:11015
status accepted
submitted 2010-07-09T03:56:16-04:00
title Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote attackers to execute arbitrary code via the (1) image handle or (2) timeformat attribute in a RealPix (.rp) or RealText (.rt) file.
version 22
redhat via4
advisories
  • rhsa
    id RHSA-2005:762
  • rhsa
    id RHSA-2005:788
refmap via4
bugtraq 20050926 RealPlayer && HelixPlayer Remote Format String Exploit
cert-vn VU#361181
confirm http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168078
debian DSA-826
fulldisc 20050926 RealPlayer && HelixPlayer Remote Format String
gentoo GLSA-200510-07
idefense 20050930 RealNetworks RealPlayer/HelixPlayer RealPix Format String Vulnerability
misc http://www.open-security.org/advisories/13
secunia
  • 16954
  • 16961
  • 16981
  • 17116
  • 17127
sreason
suse SUSE-SA:2005:059
Last major update 17-10-2016 - 23:29
Published 27-09-2005 - 16:03
Last modified 10-10-2017 - 21:30
Back to Top