Описание
Stack-based buffer overflow in the RT3 plugin, as used in RealPlayer 8, RealOne Player, RealOne Player 10 beta, and RealOne Player Enterprise, allows remote attackers to execute arbitrary code via a malformed .R3T file.
Ссылки
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:realnetworks:realone_player:*:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realone_player:*:*:enterprise:*:*:*:*:*
cpe:2.3:a:realnetworks:realone_player:10_beta:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realplayer:8.0:*:*:*:*:*:*:*
EPSS
Процентиль: 91%
0.06287
Низкий
5.1 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
redhat
больше 21 года назад
Stack-based buffer overflow in the RT3 plugin, as used in RealPlayer 8, RealOne Player, RealOne Player 10 beta, and RealOne Player Enterprise, allows remote attackers to execute arbitrary code via a malformed .R3T file.
github
больше 3 лет назад
Stack-based buffer overflow in the RT3 plugin, as used in RealPlayer 8, RealOne Player, RealOne Player 10 beta, and RealOne Player Enterprise, allows remote attackers to execute arbitrary code via a malformed .R3T file.
EPSS
Процентиль: 91%
0.06287
Низкий
5.1 Medium
CVSS2
Дефекты
NVD-CWE-Other