Описание
Multiple buffer overflows in RealOne and RealPlayer allow remote attackers to execute arbitrary code via (1) a Synchronized Multimedia Integration Language (SMIL) file with a long parameter, (2) a long long filename in a rtsp:// request, e.g. from a .m3u file, or (3) certain "Now Playing" options on a downloaded file with a long filename.
Ссылки
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realplayer:*:g2:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realplayer:6.0:*:win32:*:*:*:*:*
cpe:2.3:a:realnetworks:realplayer:7.0:*:win32:*:*:*:*:*
cpe:2.3:a:realnetworks:realplayer:8.0:*:win32:*:*:*:*:*
EPSS
Процентиль: 88%
0.0385
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
Multiple buffer overflows in RealOne and RealPlayer allow remote attackers to execute arbitrary code via (1) a Synchronized Multimedia Integration Language (SMIL) file with a long parameter, (2) a long long filename in a rtsp:// request, e.g. from a .m3u file, or (3) certain "Now Playing" options on a downloaded file with a long filename.
EPSS
Процентиль: 88%
0.0385
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other