Vulnerability Description
Multiple buffer overflows in RealNetworks RealPlayer before 17.0.10.8 allow remote attackers to execute arbitrary code via a malformed (1) elst or (2) stsz atom in an MP4 file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Realnetworks | Realplayer | <= 17.0.8.22 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/59238
- http://service.real.com/realplayer/security/06272014_player/en/Vendor Advisory
- http://www.fortiguard.com/advisory/RealNetworks-RealPlayer-Memory-Corruption/
- http://www.securitytracker.com/id/1030524
- http://secunia.com/advisories/59238
- http://service.real.com/realplayer/security/06272014_player/en/Vendor Advisory
- http://www.fortiguard.com/advisory/RealNetworks-RealPlayer-Memory-Corruption/
- http://www.securitytracker.com/id/1030524
FAQ
What is CVE-2014-3113?
CVE-2014-3113 is a vulnerability with a CVSS score of 9.3 (HIGH). Multiple buffer overflows in RealNetworks RealPlayer before 17.0.10.8 allow remote attackers to execute arbitrary code via a malformed (1) elst or (2) stsz atom in an MP4 file.
How severe is CVE-2014-3113?
CVE-2014-3113 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-3113?
Check the references section above for vendor advisories and patch information. Affected products include: Realnetworks Realplayer.