RealNetworks RealPlayer における SIPR ヒープオーバーフローの脆弱性
| Title |
RealNetworks RealPlayer における SIPR ヒープオーバーフローの脆弱性
|
| Summary |
RealNetworks RealPlayer には、SIPR ヒープオーバーフローの脆弱性が存在します。
|
| Possible impacts |
この脆弱性による影響の詳細は不明です。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
Dec. 10, 2010, midnight |
| Registration Date |
Jan. 7, 2011, 3:36 p.m. |
| Last Update |
Jan. 7, 2011, 3:36 p.m. |
|
CVSS2.0 : 危険
|
| Score |
9.3
|
| Vector |
AV:N/AC:M/Au:N/C:C/I:C/A:C |
Affected System
| レッドハット |
|
Red Hat Enterprise Linux 4 (as)
|
|
Red Hat Enterprise Linux 4 (es)
|
|
Red Hat Enterprise Linux 4 (ws)
|
|
Red Hat Enterprise Linux 4.8 (as)
|
|
Red Hat Enterprise Linux 4.8 (es)
|
|
Red Hat Enterprise Linux Desktop 4.0
|
| リアルネットワークス |
|
RealNetworks RealPlayer (enterprise) 2.1.2
|
|
RealNetworks RealPlayer 11.0 から 11.1
|
|
RealNetworks RealPlayer 11.0 から 11.1 (Mac)
|
|
RealNetworks RealPlayer 11.0.2.1744 (Linux)
|
|
RealNetworks RealPlayer SP 1.0 から 1.0.1
|
|
RealNetworks RealPlayer SP 1.0.2 から 1.1.1
|
|
RealNetworks RealPlayer SP 1.1.2 から 1.1.4
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
| No |
Changed Details |
Date of change |
| 0 |
[2011年01月07日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
NVD Vulnerability Information
CVE-2010-4379
| Summary |
Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.4, RealPlayer Enterprise 2.1.2, Mac RealPlayer 11.0 through 11.1, Linux RealPlayer 11.0.2.1744, and possibly HelixPlayer 1.0.6 and other versions, allows remote attackers to have an unspecified impact via a crafted SIPR file.
|
| Publication Date |
Dec. 15, 2010, 1 a.m. |
| Registration Date |
Jan. 29, 2021, 11:08 a.m. |
| Last Update |
Nov. 21, 2024, 10:20 a.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:* |
|
|
|
|
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:* |
|
|
|
|
| Configuration3 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:* |
|
|
|
|
| execution environment |
| 1 |
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* |
| Configuration4 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:* |
|
|
|
|
| execution environment |
| 1 |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
| Configuration5 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:realnetworks:realplayer:2.1.2:*:enterprise:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List