Vulnerability Description
Heap-based buffer overflow in the cook codec in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, and Linux RealPlayer 11.0.2.1744 allows remote attackers to execute arbitrary code via unspecified data in the initialization buffer.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Realnetworks | Realplayer | 11.0 |
| Realnetworks | Realplayer Sp | 1.0.0 |
| Linux | Linux Kernel | All versions |
Related Weaknesses (CWE)
References
- http://osvdb.org/69849
- http://service.real.com/realplayer/security/12102010_player/en/Vendor Advisory
- http://www.securitytracker.com/id?1024861
- http://www.zerodayinitiative.com/advisories/ZDI-10-279
- http://osvdb.org/69849
- http://service.real.com/realplayer/security/12102010_player/en/Vendor Advisory
- http://www.securitytracker.com/id?1024861
- http://www.zerodayinitiative.com/advisories/ZDI-10-279
FAQ
What is CVE-2010-4389?
CVE-2010-4389 is a vulnerability with a CVSS score of 9.3 (HIGH). Heap-based buffer overflow in the cook codec in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, and Linux RealPlayer 11.0.2.1744 allows remote attackers to execute arbitrar...
How severe is CVE-2010-4389?
CVE-2010-4389 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-4389?
Check the references section above for vendor advisories and patch information. Affected products include: Realnetworks Realplayer, Realnetworks Realplayer Sp, Linux Linux Kernel.