2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2007-5081" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2007-10-31T17:46:00.000" ,
"lastModified" : "2017-09-29T01:29:29.157" ,
"vulnStatus" : "Modified" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Heap-based buffer overflow in RealNetworks RealPlayer 8, 10, 10.1, and possibly 10.5; RealOne Player 1 and 2; and RealPlayer Enterprise allows remote attackers to execute arbitrary code via a crafted RM file."
} ,
{
"lang" : "es" ,
"value" : "Un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria en RealNetworks RealPlayer versiones 8, 10, 10.1 y posiblemente 10.5; RealOne Player versiones 1 y 2; y RealPlayer Enterprise, permite a atacantes remotos ejecutar c\u00f3digo arbitrario por medio de un archivo RM dise\u00f1ado."
}
] ,
"vendorComments" : [
{
"organization" : "Red Hat" ,
"comment" : "This issue was fixed in RealPlayer for Red Hat Enterprise Linux 3 Extras, 4 Extras, 5 Supplementary by RHSA-2007:0841 on 17th August 2007:\nhttp://rhn.redhat.com/errata/RHSA-2007-0841.html)on\n\n(Our original advisory did not mention this issue was fixed as the details of the issue were not made public by RealNetworks until 25th October 2007)" ,
"lastModified" : "2007-11-01T00:00:00"
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:C/I:C/A:C" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
"availabilityImpact" : "COMPLETE" ,
"baseScore" : 9.3
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-119"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realone_player:*:*:mac:en:*:*:*:*" ,
"matchCriteriaId" : "E42CFE29-8AF0-4FAE-88FD-4E2D373FE16D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realone_player:1.0:*:windows:en:*:*:*:*" ,
"matchCriteriaId" : "880F633E-3833-4E07-91AE-F11E77DC3AF4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realone_player:2.0:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "72F332E7-13EA-447D-8116-7CD404120040"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4E6051B4-1B15-44C0-B2CD-5504E68C60F2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.0:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "15FABF57-B77B-49FF-BEAF-1E0D6BD4B66F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.0:10.0.0.305:mac:*:*:*:*:*" ,
"matchCriteriaId" : "995983E3-6968-4071-A3E7-BC84800894C9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.0:10.0.0.331:mac:*:*:*:*:*" ,
"matchCriteriaId" : "1D5A55EF-BFC7-4703-B115-910DC8338733"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.0:10.0.0.352:mac:*:*:*:*:*" ,
"matchCriteriaId" : "A4FE917E-31A3-4065-B723-FACECEB1BEB8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.0:10.0.5:linux:*:*:*:*:*" ,
"matchCriteriaId" : "28F3DFCA-C0E8-43FC-B313-7E21978AE481"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.0:10.0.6:linux:*:*:*:*:*" ,
"matchCriteriaId" : "2A874D31-8FDB-456C-ABF8-94F812DD1B67"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.0:10.0.7:linux:*:*:*:*:*" ,
"matchCriteriaId" : "CB81B184-CD30-42DD-8BA6-BED303BF6377"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.0:10.0.8:linux:*:*:*:*:*" ,
"matchCriteriaId" : "F62E12E0-D806-40F4-8779-18679572AD04"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.0:10.0.9:linux:*:*:*:*:*" ,
"matchCriteriaId" : "5567F40F-B04C-4866-A7B2-C796AAA0CE86"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.1:10.0.0.396:mac:*:*:*:*:*" ,
"matchCriteriaId" : "84E4F874-E9A5-40F1-82CF-5C2E4749DF6C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.1:10.0.0.412:mac:*:*:*:*:*" ,
"matchCriteriaId" : "EBC0DDE6-356C-4EE7-83E1-7EF5A0C5A751"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.5:6.0.12.1040:windows:*:*:*:*:*" ,
"matchCriteriaId" : "FB3CC6D6-334F-4F9C-8A5C-7EC3DCACEC50"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.5:6.0.12.1578:windows:*:*:*:*:*" ,
"matchCriteriaId" : "414712E9-6901-4D33-B970-36CC238D4257"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.5:6.0.12.1698:windows:*:*:*:*:*" ,
"matchCriteriaId" : "35AAD3FF-B70E-46CB-A3C1-34B2412EE6EC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer:10.5:6.0.12.1741:windows:*:*:*:*:*" ,
"matchCriteriaId" : "FA78969A-CBAE-4B67-96E7-F7EC9FD78E38"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:realnetworks:realplayer_enterprise:*:*:windows:en:*:*:*:*" ,
"matchCriteriaId" : "B9BA3DF0-9785-4F70-A9A3-38F657B52AA7"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://osvdb.org/38340" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/27361" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://securitytracker.com/id?1018866" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://service.real.com/realplayer/security/10252007_player/en/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.attrition.org/pipermail/vim/2007-October/001841.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/26214" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2007/3628" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37435" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11625" ,
"source" : "cve@mitre.org"
}
]
}