fkie_cve-2007-5601
Vulnerability from fkie_nvd
Published
2007-10-20 20:17
Modified
2024-11-21 00:38
Severity ?
Summary
Stack-based buffer overflow in the Database Component in MPAMedia.dll in RealNetworks RealPlayer 10.5 and 11 beta, and earlier versions including 10, RealOne Player, and RealOne Player 2, allows remote attackers to execute arbitrary code via certain playlist names, as demonstrated via the import method to the IERPCtl ActiveX control in ierpplug.dll.
References
cret@cert.orghttp://secunia.com/advisories/27248Vendor Advisory
cret@cert.orghttp://service.real.com/realplayer/security/191007_player/en/
cret@cert.orghttp://www.infosecblog.org/2007/10/nasa-bans-ie.html
cret@cert.orghttp://www.kb.cert.org/vuls/id/871673US Government Resource
cret@cert.orghttp://www.securityfocus.com/bid/26130
cret@cert.orghttp://www.securitytracker.com/id?1018843
cret@cert.orghttp://www.symantec.com/enterprise/security_response/weblog/2007/10/realplayer_exploit_on_the_loos.html
cret@cert.orghttp://www.us-cert.gov/cas/techalerts/TA07-297A.htmlUS Government Resource
cret@cert.orghttp://www.vupen.com/english/advisories/2007/3548Vendor Advisory
cret@cert.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/37280
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27248Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://service.real.com/realplayer/security/191007_player/en/
af854a3a-2127-422b-91ae-364da2661108http://www.infosecblog.org/2007/10/nasa-bans-ie.html
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/871673US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/26130
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1018843
af854a3a-2127-422b-91ae-364da2661108http://www.symantec.com/enterprise/security_response/weblog/2007/10/realplayer_exploit_on_the_loos.html
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA07-297A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3548Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/37280
Impacted products
Vendor Product Version
realnetworks realplayer 10.0
realnetworks realplayer 10.5
realnetworks realplayer 11_beta



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD49D16C-B0AC-4228-9984-010661596232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "348F3214-E5C2-4D39-916F-1B0263D13F40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realnetworks:realplayer:11_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "64C3CD7C-9CD8-4BC3-9ECE-CE39FB02E602",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the Database Component in MPAMedia.dll in RealNetworks RealPlayer 10.5 and 11 beta, and earlier versions including 10, RealOne Player, and RealOne Player 2, allows remote attackers to execute arbitrary code via certain playlist names, as demonstrated via the import method to the IERPCtl ActiveX control in ierpplug.dll."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en el Database Component en la biblioteca MPAMedia.dll en RealNetworks RealPlayer versiones 10.5 y 11 beta, y anteriores, incluyendo versi\u00f3n 10, RealOne Player y RealOne Player versi\u00f3n 2, permite a atacantes remotos ejecutar c\u00f3digo arbitrario por medio de ciertos nombres de lista de reproducci\u00f3n, como es demostrado por medio del m\u00e9todo import en el control ActiveX IERPCtl en la biblioteca ierpplug.dl."
    }
  ],
  "id": "CVE-2007-5601",
  "lastModified": "2024-11-21T00:38:17.480",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-10-20T20:17:00.000",
  "references": [
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27248"
    },
    {
      "source": "cret@cert.org",
      "url": "http://service.real.com/realplayer/security/191007_player/en/"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.infosecblog.org/2007/10/nasa-bans-ie.html"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/871673"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securityfocus.com/bid/26130"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securitytracker.com/id?1018843"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.symantec.com/enterprise/security_response/weblog/2007/10/realplayer_exploit_on_the_loos.html"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-297A.html"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/3548"
    },
    {
      "source": "cret@cert.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37280"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27248"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://service.real.com/realplayer/security/191007_player/en/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.infosecblog.org/2007/10/nasa-bans-ie.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/871673"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/26130"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018843"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.symantec.com/enterprise/security_response/weblog/2007/10/realplayer_exploit_on_the_loos.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-297A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/3548"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37280"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vendorComments": [
    {
      "comment": "Not vulnerable. This issue did not affect versions of RealPlayer as shipped with Red Hat Enterprise Linux 3 and 4 Extras or with Red Hat Enterprise Linux 5 Supplementary.",
      "lastModified": "2007-10-23T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.