Realnetworks RealPlayer における任意のコードを実行される脆弱性
| Title |
Realnetworks RealPlayer における任意のコードを実行される脆弱性
|
| Summary |
Realnetworks RealPlayer には、任意のコードを実行される脆弱性が存在します。
|
| Possible impacts |
第三者により、ヒープメモリの破壊を誘発する不正な ASMRuleBook 構造体を含んだファイルを介して、任意のコードを実行される可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
Jan. 19, 2010, midnight |
| Registration Date |
Feb. 17, 2010, 11:46 a.m. |
| Last Update |
Feb. 17, 2010, 11:46 a.m. |
|
CVSS2.0 : 危険
|
| Score |
9.3
|
| Vector |
AV:N/AC:M/Au:N/C:C/I:C/A:C |
Affected System
| リアルネットワークス |
|
RealNetworks RealPlayer 10
|
|
RealNetworks RealPlayer 10.5
|
|
RealNetworks RealPlayer 11
|
|
RealNetworks RealPlayer SP 1.0.0
|
|
RealNetworks RealPlayer SP 1.0.1
|
|
RealNetworks RealPlayer (enterprise)
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
| No |
Changed Details |
Date of change |
| 0 |
[2010年02月17日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
NVD Vulnerability Information
CVE-2009-4241
| Summary |
Heap-based buffer overflow in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows remote attackers to execute arbitrary code via a file with invalid ASMRuleBook structures that trigger heap memory corruption.
|
| Summary |
Specific affected release information can be found from RealNetworks at:
http://service.real.com/realplayer/security/01192010_player/en/
|
| Publication Date |
Jan. 26, 2010, 4:30 a.m. |
| Registration Date |
Jan. 29, 2021, 1:26 p.m. |
| Last Update |
Oct. 11, 2018, 4:48 a.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer_enterprise:*:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:* |
|
|
|
|
| execution environment |
| 1 |
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:10.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:* |
|
|
|
|
| execution environment |
| 1 |
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* |
| Configuration3 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:realnetworks:helix_player:10.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:helix_player:11.0.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:helix_player:11.0.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:10.0:*:linux:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.0:*:linux:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.1:*:linux:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List