Lucene search

K
cveMitreCVE-2005-2629
HistoryNov 18, 2005 - 11:03 p.m.

CVE-2005-2629

2005-11-1823:03:00
mitre
web.nvd.nist.gov
41
cve-2005-2629
realnetworks
realplayer
integer overflow
buffer overflow
remote code execution
vulnerability
nvd

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

AI Score

7.7

Confidence

Low

EPSS

0.26

Percentile

96.7%

Integer overflow in RealNetworks RealPlayer 8, 10, and 10.5, RealOne Player 1 and 2, and Helix Player 10.0.0 allows remote attackers to execute arbitrary code via an .rm movie file with a large value in the length field of the first data packet, which leads to a stack-based buffer overflow, a different vulnerability than CVE-2004-1481.

Affected configurations

Nvd
Node
realnetworkshelix_playerMatch1.0linux
OR
realnetworkshelix_playerMatch1.0.1linux
OR
realnetworkshelix_playerMatch1.0.2linux
OR
realnetworkshelix_playerMatch1.0.3linux
OR
realnetworkshelix_playerMatch1.0.4linux
OR
realnetworkshelix_playerMatch1.0.5linux
OR
realnetworksrealone_playerMatch1.0
OR
realnetworksrealone_playerMatch2.0
OR
realnetworksrealplayerenterprise
OR
realnetworksrealplayerMatch8.0win32
OR
realnetworksrealplayerMatch10.0
OR
realnetworksrealplayerMatch10.0linux
OR
realnetworksrealplayerMatch10.0mac_os_x
OR
realnetworksrealplayerMatch10.5
OR
realnetworksrealplayerMatch10.5_6.0.12.1040
OR
realnetworksrealplayerMatch10.5_6.0.12.1053
OR
realnetworksrealplayerMatch10.5_6.0.12.1056
OR
realnetworksrealplayerMatch10.5_6.0.12.1059
OR
realnetworksrealplayerMatch10.5_6.0.12.1069
OR
realnetworksrealplayerMatch10.5_6.0.12.1235
VendorProductVersionCPE
realnetworkshelix_player1.0cpe:2.3:a:realnetworks:helix_player:1.0:*:linux:*:*:*:*:*
realnetworkshelix_player1.0.1cpe:2.3:a:realnetworks:helix_player:1.0.1:*:linux:*:*:*:*:*
realnetworkshelix_player1.0.2cpe:2.3:a:realnetworks:helix_player:1.0.2:*:linux:*:*:*:*:*
realnetworkshelix_player1.0.3cpe:2.3:a:realnetworks:helix_player:1.0.3:*:linux:*:*:*:*:*
realnetworkshelix_player1.0.4cpe:2.3:a:realnetworks:helix_player:1.0.4:*:linux:*:*:*:*:*
realnetworkshelix_player1.0.5cpe:2.3:a:realnetworks:helix_player:1.0.5:*:linux:*:*:*:*:*
realnetworksrealone_player1.0cpe:2.3:a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*
realnetworksrealone_player2.0cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*
realnetworksrealplayer*cpe:2.3:a:realnetworks:realplayer:*:*:enterprise:*:*:*:*:*
realnetworksrealplayer8.0cpe:2.3:a:realnetworks:realplayer:8.0:*:win32:*:*:*:*:*
Rows per page:
1-10 of 201

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

AI Score

7.7

Confidence

Low

EPSS

0.26

Percentile

96.7%