HIGH · 9.3

CVE-2009-4247

Stack-based buffer overflow in protocol/rtsp/rtspclnt.cpp in RealNetworks RealPlayer 10; RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741; RealPlayer 11 11.0.x; RealPlayer SP 1.0.0 and 1.0.1; RealPlaye...

Vulnerability Description

Stack-based buffer overflow in protocol/rtsp/rtspclnt.cpp in RealNetworks RealPlayer 10; RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741; RealPlayer 11 11.0.x; RealPlayer SP 1.0.0 and 1.0.1; RealPlayer Enterprise; Mac RealPlayer 10, 10.1, 11.0, and 11.0.1; Linux RealPlayer 10, 11.0.0, and 11.0.1; and Helix Player 10.x, 11.0.0, and 11.0.1 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an ASM RuleBook with a large number of rules, related to an "array overflow."

CVSS Score

9.3

HIGH

AV:N/AC:M/Au:N/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
RealnetworksRealplayer10.0
RealnetworksRealplayer EnterpriseAll versions
RealnetworksRealplayer Sp1.0.0
MicrosoftWindowsAll versions
AppleMac Os XAll versions
RealnetworksHelix Player10.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2009-4247?

CVE-2009-4247 is a vulnerability with a CVSS score of 9.3 (HIGH). Stack-based buffer overflow in protocol/rtsp/rtspclnt.cpp in RealNetworks RealPlayer 10; RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741; RealPlayer 11 11.0.x; RealPlayer SP 1.0.0 and 1.0.1; RealPlaye...

How severe is CVE-2009-4247?

CVE-2009-4247 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2009-4247?

Check the references section above for vendor advisories and patch information. Affected products include: Realnetworks Realplayer, Realnetworks Realplayer Enterprise, Realnetworks Realplayer Sp, Microsoft Windows, Apple Mac Os X.