Vulnerability Description
Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, RealPlayer Enterprise 2.1.2 and 2.1.3, Linux RealPlayer 11.0.2.1744, and possibly HelixPlayer 1.0.6 and other versions, allows remote attackers to execute arbitrary code via crafted ImageMap data in a RealMedia file, related to certain improper integer calculations.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Realnetworks | Realplayer | 11.0 |
| Realnetworks | Realplayer Sp | 1.0.0 |
| Linux | Linux Kernel | All versions |
Related Weaknesses (CWE)
References
- http://osvdb.org/69852
- http://service.real.com/realplayer/security/12102010_player/en/Vendor Advisory
- http://www.redhat.com/support/errata/RHSA-2010-0981.html
- http://www.securitytracker.com/id?1024861
- http://www.zerodayinitiative.com/advisories/ZDI-10-280
- http://osvdb.org/69852
- http://service.real.com/realplayer/security/12102010_player/en/Vendor Advisory
- http://www.redhat.com/support/errata/RHSA-2010-0981.html
- http://www.securitytracker.com/id?1024861
- http://www.zerodayinitiative.com/advisories/ZDI-10-280
FAQ
What is CVE-2010-4392?
CVE-2010-4392 is a vulnerability with a CVSS score of 9.3 (HIGH). Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, RealPlayer Enterprise 2.1.2 and 2.1.3, Linux RealPlayer 11.0.2.1744, and possibly HelixPlayer ...
How severe is CVE-2010-4392?
CVE-2010-4392 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-4392?
Check the references section above for vendor advisories and patch information. Affected products include: Realnetworks Realplayer, Realnetworks Realplayer Sp, Linux Linux Kernel.