CVE-2007-3410
CVSS V2 High 9.3
CVSS V3 None
Description
Stack-based buffer overflow in the SmilTimeValue::parseWallClockValue function in smlprstime.cpp in RealNetworks RealPlayer 10, 10.1, and possibly 10.5, RealOne Player, RealPlayer Enterprise, and Helix Player 10.5-GOLD and 10.0.5 through 10.0.8, allows remote attackers to execute arbitrary code via an SMIL (SMIL2) file with a long wallclock value.
Overview
- CVE ID
- CVE-2007-3410
- Assigner
- cve@mitre.org
- Vulnerability Status
- Modified
- Published Version
- 2007-06-26T22:30:00
- Last Modified Date
- 2017-10-11T01:32:47
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:realnetworks:helix_player:10.0.5:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:helix_player:10.0.6:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:helix_player:10.0.7:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:helix_player:10.0.8:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:helix_player:10.5-gold:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:realone_player:*:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:realplayer:10.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:realplayer_enterprise:*:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:C/I:C/A:C
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- COMPLETE
- Integrity Impact
- COMPLETE
- Availability Impact
- COMPLETE
- Base Score
- 9.3
- Severity
- HIGH
- Exploitability Score
- 8.6
- Impact Score
- 10
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2007-3410 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3410 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 18:58:05 | Added to TrackCVE |