CERTA-2004-AVI-194
Vulnerability from certfr_avis - Published: - Updated:None
Description
Deux vulnérabilités de type débordement de mémoire sont présentes dans le logiciel Real Player :
- une mauvaise gestion des URL contenant un grand nombre de caractères "." ;
- une faille dans le composant embd3260.dll à la création d'un message d'erreur lors de la réception d'un fichier invalide.
Par le biais d'un site habilement constitué, un individu mal intentionné peut forcer l'exécution de code arbitraire à distance sur le poste d'un utilisateur employant une version vulnérable de Real Player.
Solution
Se référer au bulletin de sécurité de l'éditeur (cf. section Documentation) pour l'obtention des correctifs.
NoneImpacted products
References
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "RealPlayer 8 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "RealPlayer Enterprise.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "RealOne Player v2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "RealPlayer 10 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "RealOne Player ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDeux vuln\u00e9rabilit\u00e9s de type d\u00e9bordement de m\u00e9moire sont pr\u00e9sentes dans\nle logiciel Real Player :\n\n- une mauvaise gestion des URL contenant un grand nombre de caract\u00e8res\n \".\" ;\n- une faille dans le composant embd3260.dll \u00e0 la cr\u00e9ation d\u0027un message\n d\u0027erreur lors de la r\u00e9ception d\u0027un fichier invalide.\n\nPar le biais d\u0027un site habilement constitu\u00e9, un individu mal intentionn\u00e9\npeut forcer l\u0027ex\u00e9cution de code arbitraire \u00e0 distance sur le poste d\u0027un\nutilisateur employant une version vuln\u00e9rable de Real Player.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur (cf. section\nDocumentation) pour l\u0027obtention des correctifs.\n",
"cves": [],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 de Real Networks du 10 juin 2004 :",
"url": "http://service.real.com/help/faq/security/040610_player/EN"
},
{
"title": "Avis de s\u00e9curit\u00e9 06.10.04 d\u0027iDefense : \"",
"url": "http://www.idefense.com/application/poi/display?id=109\u0026type=vulnerabilities"
},
{
"title": "Avis de s\u00e9curit\u00e9 AD20040610 d\u0027eEye :",
"url": "http://www.eeye.com/html/research/advisories/AD20040610.html"
}
],
"reference": "CERTA-2004-AVI-194",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2004-06-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": null,
"title": "Multiples vuln\u00e9rabilit\u00e9s de RealPlayer",
"vendor_advisories": [
{
"published_at": null,
"title": "Avis de s\u00e9curit\u00e9 de Real Networks du 10 juin 2004",
"url": null
},
{
"published_at": null,
"title": "Avis de s\u00e9curit\u00e9 d\u0027iDefense",
"url": null
},
{
"published_at": null,
"title": "Avis de s\u00e9curit\u00e9 d\u0027eEye",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…