2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2005-2922" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2005-12-31T05:00:00.000" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T00:00:43.623" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Heap-based buffer overflow in the embedded player in multiple RealNetworks products and versions including RealPlayer 10.x, RealOne Player, and Helix Player allows remote malicious servers to cause a denial of service (crash) and possibly execute arbitrary code via a chunked Transfer-Encoding HTTP response in which either (1) the chunk header length is specified as -1, (2) the chunk header with a length that is less than the actual amount of sent data, or (3) a missing chunk header."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:C/I:C/A:C" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 9.3 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : true ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-119"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:helix_player:10.0:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "E971D8BF-C1B8-4489-9824-D7F1ACBA8DFB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:helix_player:10.0.1:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "42C40382-8A43-47BC-B112-1FF87D513F8B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:helix_player:10.0.2:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "41015020-77F1-4604-8F90-1D3398ABF96A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:helix_player:10.0.3:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "8F09FC85-710E-4B98-BB7B-D388F3EB58DE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:helix_player:10.0.4:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "0CCEE460-284C-408D-A4FB-A49622004E84"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:helix_player:10.0.5:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "82258764-D89B-482B-BB7E-31D86BD6C586"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:helix_player:10.0.6:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "7621E796-2AF1-447B-B350-74841A85855E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realone_player:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D5695A49-561F-434E-92AE-AEF13162BD78"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realone_player:0.288:*:mac_os_x:*:*:*:*:*" ,
"matchCriteriaId" : "FA36B216-65D0-490C-8102-7D99D21417CF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realone_player:0.297:*:mac_os_x:*:*:*:*:*" ,
"matchCriteriaId" : "CD6C057A-407C-4794-9250-80E07C8E09CA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7E940DAB-0CD5-4EC0-916F-6C0B2AE26D19"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CF6535A6-6647-4E60-B5AA-24DFC06360AE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:*:*:enterprise:*:*:*:*:*" ,
"matchCriteriaId" : "19BC5A59-BCBD-4859-8329-B4974D43DB90"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:8.0:*:win32:*:*:*:*:*" ,
"matchCriteriaId" : "003D7E29-9970-4984-9756-C070E15B7979"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CD49D16C-B0AC-4228-9984-010661596232"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.0.0.305:*:mac_os:*:*:*:*:*" ,
"matchCriteriaId" : "3ADE53B2-53D5-4E84-9CFF-9D7C12727115"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.0.0.331:*:mac_os:*:*:*:*:*" ,
"matchCriteriaId" : "EB4B64DF-7D14-460C-AE2D-02C67575CC9C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.0.1:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "382E5B10-AE07-4325-BEE7-7B0432CDF845"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.0.2:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "96897C76-EB4F-49A7-997E-C735CDD2B83A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.0.3:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "10A106E1-78FE-4CA3-9B3B-956B88E758E5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.0.4:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "7E2DC70C-42FF-493D-AA17-4BE1EA475839"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.0.5:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "71ACF9F5-6779-41FD-9F96-4DD202035DEA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.0.6:*:linux:*:*:*:*:*" ,
"matchCriteriaId" : "F29F875A-883C-4C8D-BF8D-4A1D83286A2F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "348F3214-E5C2-4D39-916F-1B0263D13F40"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1040:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "91278EFD-0285-4389-9C53-50FE225C3C19"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1053:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "336246FA-A06F-4792-9923-E6948F3494FB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1056:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "06C7BF07-8B9A-4BDF-BEA9-C55ABDEA8165"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1059:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CEC15988-96A0-4EBE-BF99-14D46F5A9553"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1069:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "41F65BDA-393F-4274-B193-B578255DB013"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1235:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8D4CADDC-84D2-45D9-99BA-A662D7490154"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:rhapsody:3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EC2B8F89-AFE2-4029-A9D3-88C99EC4774C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:rhapsody:3.0_build_0.815:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6BDA20ED-8151-44EC-AAFC-A273E918AE29"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/19358" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/19365" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://securitytracker.com/id?1015808" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.kb.cert.org/vuls/id/172489" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Third Party Advisory" ,
"US Government Resource"
]
} ,
{
"url" : "http://www.novell.com/linux/security/advisories/2006_18_realplayer.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2005-762.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2005-788.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/17202" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://www.service.real.com/realplayer/security/03162006_player/en/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/1057" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25409" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11444" ,
"source" : "cve@mitre.org"
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "http://secunia.com/advisories/19358" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/19365" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://securitytracker.com/id?1015808" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.kb.cert.org/vuls/id/172489" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Third Party Advisory" ,
"US Government Resource"
]
} ,
{
"url" : "http://www.novell.com/linux/security/advisories/2006_18_realplayer.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2005-762.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2005-788.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/17202" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://www.service.real.com/realplayer/security/03162006_player/en/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/1057" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25409" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11444" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}