CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
EPSS
Percentile
99.7%
Helix Player, and media players based on the Helix Player, contain a format string vulnerability that may allow a remote attacker to execute arbitrary code on a vulnerable system.
Helix Player is used to play various types of media files on UNIX systems. The Helix Media Player contains a format string vulnerability in the routines that handle media files. A remote attacker can exploit this vulnerability by persuading a user to access a specially crafted media file, such as a realpix (.rp) or realtext (.rt) file. In addition, web browsers can be configured to automatically launch the Helix Player when media content is encountered, thus an attack may be triggered by visiting a malicious website.
This issue also affects media players based on the Helix Player, including Real Player for Linux systems. Note there is publicly available exploit code for this vulnerability.
A remote attacker may be able to execute arbitrary code with the privileges of the Helix Media Player process.
Upgrade
This vulnerability was corrected in Helix Player 1.0.6 and Real Player 10 for Linux.
Do not access media files from untrusted sources
Accessing media files from trusted or known sources only will reduce the chances of exploitation.
Disable Helix Player or Real Player for Linux support in the web browser
Configuring a web browser to not automatically launch the Helix Player when media content is encountered will reduce the chances of exploitation.
361181
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: September 30, 2005
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see <http://www.debian.org/security/2005/dsa-826>
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23361181 Feedback>).
Updated: September 30, 2005
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Updated: September 29, 2005
Affected
Updated Helixplayer packages for Red Hat Enterprise Linux 4 and updated RealPlayer packages for Red Hat Enterprise Linux Extras (version 3 and version 4) to correct this issue are available at the URL below and by using the Red Hat Network ‘up2date’ tool.
<http://rhn.redhat.com/errata/CAN-2005-2710.html>
The vendor has not provided us with any further information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was reported by c0ntexb.
This document was written by Jeff Gennari.
CVE IDs: | CVE-2005-2710 |
---|---|
Severity Metric: | 12.58 Date Public: |
secunia.com/advisories/16954/
secunia.com/advisories/16961/
service.real.com/help/faq/security/050930_player/EN/
www.idefense.com/application/poi/display?id=311&type=vulnerabilities&flashstatus=true
www.redhat.com/support/errata/RHSA-2005-788.html
player.helixcommunity.org/2005/releases/hx1gold/HX1_0_6ReleaseNotes.html