Vulnerability Description
Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, and RealPlayer Enterprise 2.1.2 and 2.1.3 allows remote attackers to execute arbitrary code via a crafted value in an unspecified header field in an RMX file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Realnetworks | Realplayer | 11.0 |
| Realnetworks | Realplayer Sp | 1.0.0 |
Related Weaknesses (CWE)
References
- http://osvdb.org/69851
- http://service.real.com/realplayer/security/12102010_player/en/Vendor Advisory
- http://www.securitytracker.com/id?1024861
- http://www.zerodayinitiative.com/advisories/ZDI-10-281
- http://osvdb.org/69851
- http://service.real.com/realplayer/security/12102010_player/en/Vendor Advisory
- http://www.securitytracker.com/id?1024861
- http://www.zerodayinitiative.com/advisories/ZDI-10-281
FAQ
What is CVE-2010-4391?
CVE-2010-4391 is a vulnerability with a CVSS score of 9.3 (HIGH). Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, and RealPlayer Enterprise 2.1.2 and 2.1.3 allows remote attackers to execute arbitrary code vi...
How severe is CVE-2010-4391?
CVE-2010-4391 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-4391?
Check the references section above for vendor advisories and patch information. Affected products include: Realnetworks Realplayer, Realnetworks Realplayer Sp.