fkie_cve-2005-2629
Vulnerability from fkie_nvd
Published
2005-11-18 23:03
Modified
2024-11-21 00:00
Severity ?
Summary
Integer overflow in RealNetworks RealPlayer 8, 10, and 10.5, RealOne Player 1 and 2, and Helix Player 10.0.0 allows remote attackers to execute arbitrary code via an .rm movie file with a large value in the length field of the first data packet, which leads to a stack-based buffer overflow, a different vulnerability than CVE-2004-1481.
References
cve@mitre.orghttp://marc.info/?l=bugtraq&m=113166476423021&w=2
cve@mitre.orghttp://secunia.com/advisories/17514/Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17559
cve@mitre.orghttp://secunia.com/advisories/17860Patch, Vendor Advisory
cve@mitre.orghttp://securityreason.com/securityalert/169
cve@mitre.orghttp://securitytracker.com/id?1015184
cve@mitre.orghttp://securitytracker.com/id?1015185
cve@mitre.orghttp://securitytracker.com/id?1015186
cve@mitre.orghttp://service.real.com/help/faq/security/051110_player/EN/Patch
cve@mitre.orghttp://www.debian.org/security/2005/dsa-915Patch, Vendor Advisory
cve@mitre.orghttp://www.eeye.com/html/research/advisories/AD20051110a.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/15381/
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/23024
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9550
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=113166476423021&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17514/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17559
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17860Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/169
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015184
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015185
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015186
af854a3a-2127-422b-91ae-364da2661108http://service.real.com/help/faq/security/051110_player/EN/Patch
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-915Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.eeye.com/html/research/advisories/AD20051110a.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/15381/
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/23024
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9550



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:realnetworks:helix_player:1.0:*:linux:*:*:*:*:*",
              "matchCriteriaId": "E290CDC0-738D-447C-BD21-95D6843BB480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realnetworks:helix_player:1.0.1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "91EF8E27-2DEC-4F46-9FEF-9FDE4327783D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realnetworks:helix_player:1.0.2:*:linux:*:*:*:*:*",
              "matchCriteriaId": "988391F6-F8D4-43A0-A423-DC93CD5ED301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realnetworks:helix_player:1.0.3:*:linux:*:*:*:*:*",
              "matchCriteriaId": "108C2C6B-B626-44CF-AFBB-F4F867A4E91A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realnetworks:helix_player:1.0.4:*:linux:*:*:*:*:*",
              "matchCriteriaId": "315A22F8-692F-4D51-ABE2-A564A7111521",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realnetworks:helix_player:1.0.5:*:linux:*:*:*:*:*",
              "matchCriteriaId": "51D19434-B812-48FA-829E-A91910BA8941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E940DAB-0CD5-4EC0-916F-6C0B2AE26D19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF6535A6-6647-4E60-B5AA-24DFC06360AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realnetworks:realplayer:*:*:enterprise:*:*:*:*:*",
              "matchCriteriaId": "19BC5A59-BCBD-4859-8329-B4974D43DB90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realnetworks:realplayer:8.0:*:win32:*:*:*:*:*",
              "matchCriteriaId": "003D7E29-9970-4984-9756-C070E15B7979",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD49D16C-B0AC-4228-9984-010661596232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realnetworks:realplayer:10.0:*:linux:*:*:*:*:*",
              "matchCriteriaId": "63F83DBE-F01B-4D6B-9CC4-D5170C2C1D44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realnetworks:realplayer:10.0:*:mac_os_x:*:*:*:*:*",
              "matchCriteriaId": "EB23A853-3AD4-4EB9-B178-12B5E6E93BBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "348F3214-E5C2-4D39-916F-1B0263D13F40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1040:*:*:*:*:*:*:*",
              "matchCriteriaId": "91278EFD-0285-4389-9C53-50FE225C3C19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1053:*:*:*:*:*:*:*",
              "matchCriteriaId": "336246FA-A06F-4792-9923-E6948F3494FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1056:*:*:*:*:*:*:*",
              "matchCriteriaId": "06C7BF07-8B9A-4BDF-BEA9-C55ABDEA8165",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1059:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEC15988-96A0-4EBE-BF99-14D46F5A9553",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1069:*:*:*:*:*:*:*",
              "matchCriteriaId": "41F65BDA-393F-4274-B193-B578255DB013",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1235:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D4CADDC-84D2-45D9-99BA-A662D7490154",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in RealNetworks RealPlayer 8, 10, and 10.5, RealOne Player 1 and 2, and Helix Player 10.0.0 allows remote attackers to execute arbitrary code via an .rm movie file with a large value in the length field of the first data packet, which leads to a stack-based buffer overflow, a different vulnerability than CVE-2004-1481."
    }
  ],
  "id": "CVE-2005-2629",
  "lastModified": "2024-11-21T00:00:00.443",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2005-11-18T23:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=113166476423021\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17514/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17559"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17860"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/169"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015184"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015185"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015186"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://service.real.com/help/faq/security/051110_player/EN/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2005/dsa-915"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.eeye.com/html/research/advisories/AD20051110a.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/15381/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23024"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9550"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=113166476423021\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17514/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17559"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17860"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/169"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015184"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015185"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015186"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://service.real.com/help/faq/security/051110_player/EN/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2005/dsa-915"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.eeye.com/html/research/advisories/AD20051110a.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/15381/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9550"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.