Vulnerability Description
Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.1, Mac RealPlayer 11.0 through 11.1, and Linux RealPlayer 11.0.2.1744 allows remote attackers to execute arbitrary code via a large Screen Width value in the Screen Descriptor header of a GIF87a file in an RTSP stream.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Realnetworks | Realplayer | 11.0 |
| Realnetworks | Realplayer Sp | 1.0.0 |
| Apple | Mac Os X | All versions |
| Linux | Linux Kernel | All versions |
Related Weaknesses (CWE)
References
- http://service.real.com/realplayer/security/12102010_player/en/Vendor Advisory
- http://www.securityfocus.com/bid/45411
- http://www.securitytracker.com/id?1024861
- http://www.zerodayinitiative.com/advisories/ZDI-10-271
- http://service.real.com/realplayer/security/12102010_player/en/Vendor Advisory
- http://www.securityfocus.com/bid/45411
- http://www.securitytracker.com/id?1024861
- http://www.zerodayinitiative.com/advisories/ZDI-10-271
FAQ
What is CVE-2010-4376?
CVE-2010-4376 is a vulnerability with a CVSS score of 9.3 (HIGH). Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.1, Mac RealPlayer 11.0 through 11.1, and Linux RealPlayer 11.0.2.1744 allows remote attackers to ...
How severe is CVE-2010-4376?
CVE-2010-4376 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-4376?
Check the references section above for vendor advisories and patch information. Affected products include: Realnetworks Realplayer, Realnetworks Realplayer Sp, Apple Mac Os X, Linux Linux Kernel.