HIGH · 9.3

CVE-2009-4248

Buffer overflow in the RTSPProtocol::HandleSetParameterRequest function in client/core/rtspprotocol.cpp in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11...

Vulnerability Description

Buffer overflow in the RTSPProtocol::HandleSetParameterRequest function in client/core/rtspprotocol.cpp in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted RTSP SET_PARAMETER request.

CVSS Score

9.3

HIGH

AV:N/AC:M/Au:N/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
RealnetworksRealplayer10.0
RealnetworksRealplayer EnterpriseAll versions
RealnetworksRealplayer Sp1.0.0
MicrosoftWindowsAll versions
AppleMac Os XAll versions
RealnetworksHelix Player10.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2009-4248?

CVE-2009-4248 is a vulnerability with a CVSS score of 9.3 (HIGH). Buffer overflow in the RTSPProtocol::HandleSetParameterRequest function in client/core/rtspprotocol.cpp in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11...

How severe is CVE-2009-4248?

CVE-2009-4248 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2009-4248?

Check the references section above for vendor advisories and patch information. Affected products include: Realnetworks Realplayer, Realnetworks Realplayer Enterprise, Realnetworks Realplayer Sp, Microsoft Windows, Apple Mac Os X.