Realnetworks RealPlayer における任意のコードを実行される脆弱性
| Title |
Realnetworks RealPlayer における任意のコードを実行される脆弱性
|
| Summary |
Realnetworks RealPlayer には、任意のコードを実行される脆弱性が存在します。
|
| Possible impacts |
巧妙に細工された長さの値をもった web.xmb ファイルが含まれた不正な .RJS スキンファイルを介して、任意のコードを実行される可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
Jan. 19, 2010, midnight |
| Registration Date |
Feb. 17, 2010, 11:48 a.m. |
| Last Update |
Feb. 17, 2010, 11:48 a.m. |
|
CVSS2.0 : 危険
|
| Score |
9.3
|
| Vector |
AV:N/AC:M/Au:N/C:C/I:C/A:C |
Affected System
| リアルネットワークス |
|
RealNetworks RealPlayer (enterprise)
|
|
RealNetworks RealPlayer 10
|
|
RealNetworks RealPlayer 10.5
|
|
RealNetworks RealPlayer 11
|
|
RealNetworks RealPlayer SP 1.0.0
|
|
RealNetworks RealPlayer SP 1.0.1
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
| No |
Changed Details |
Date of change |
| 0 |
[2010年02月17日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
NVD Vulnerability Information
CVE-2009-4246
| Summary |
Stack-based buffer overflow in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows user-assisted remote attackers to execute arbitrary code via a malformed .RJS skin file that contains a web.xmb file with crafted length values.
|
| Summary |
Specific affected release information can be found from RealNetworks at:
http://service.real.com/realplayer/security/01192010_player/en/
|
| Publication Date |
Jan. 26, 2010, 4:30 a.m. |
| Registration Date |
Jan. 29, 2021, 1:26 p.m. |
| Last Update |
Oct. 11, 2018, 4:48 a.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer_enterprise:*:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:* |
|
|
|
|
| execution environment |
| 1 |
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:10.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:* |
|
|
|
|
| execution environment |
| 1 |
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* |
| Configuration3 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:realnetworks:helix_player:10.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:helix_player:11.0.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:helix_player:11.0.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:10.0:*:linux:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.0:*:linux:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.1:*:linux:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List