CVE-2009-4247
CVSS V2 High 9.3
CVSS V3 None
Description
Stack-based buffer overflow in protocol/rtsp/rtspclnt.cpp in RealNetworks RealPlayer 10; RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741; RealPlayer 11 11.0.x; RealPlayer SP 1.0.0 and 1.0.1; RealPlayer Enterprise; Mac RealPlayer 10, 10.1, 11.0, and 11.0.1; Linux RealPlayer 10, 11.0.0, and 11.0.1; and Helix Player 10.x, 11.0.0, and 11.0.1 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an ASM RuleBook with a large number of rules, related to an "array overflow."
Overview
- CVE ID
- CVE-2009-4247
- Assigner
- cve@mitre.org
- Vulnerability Status
- Modified
- Published Version
- 2010-01-25T19:30:01
- Last Modified Date
- 2017-09-19T01:29:56
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:realplayer_enterprise:*:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:realplayer:10.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:a:realnetworks:helix_player:10.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:helix_player:11.0.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:helix_player:11.0.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:realplayer:10.0:*:linux:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:realplayer:11.0.0:*:linux:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:realnetworks:realplayer:11.0.1:*:linux:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:C/I:C/A:C
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- COMPLETE
- Integrity Impact
- COMPLETE
- Availability Impact
- COMPLETE
- Base Score
- 9.3
- Severity
- HIGH
- Exploitability Score
- 8.6
- Impact Score
- 10
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2009-4247 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4247 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 08:35:41 | Added to TrackCVE |