2024-04-04 08:46:00 +00:00

231 lines
7.9 KiB
JSON

{
"id": "CVE-2010-4378",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-12-14T16:00:04.430",
"lastModified": "2011-01-26T06:52:14.913",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The drv2.dll (aka RV20 decompression) module in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, RealPlayer Enterprise 2.1.2 and 2.1.3, Linux RealPlayer 11.0.2.1744, and possibly HelixPlayer 1.0.6 and other versions, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted value of an unspecified length field in an RV20 video stream."
},
{
"lang": "es",
"value": "El m\u00f3dulo drv2.dll (tambi\u00e9n conocido como descompresi\u00f3n RV20) en RealNetworks RealPlayer v11.0 a v11.1, RealPlayer SP v1.0 a v1.1.5, RealPlayer Enterprise v2.1.2 a v2.1.3 y Linux RealPlayer v11.0.2.1744 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de la memoria mont\u00edculo) a trav\u00e9s de un valor modificado en un campo de longitud no especificada en una secuencia de v\u00eddeo RV20."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A8985B3B-BCC9-431D-9788-0C1949DF46E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9C7517C2-71A8-4223-9F9A-2FE5A2153B53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "11B7CB5F-ACFA-439B-A9B7-54DA402A6029"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A681B8-62F1-4B23-9E0B-39C61BE72F44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F826B276-91E6-495E-B429-51B1C5ECB146"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0A732E6C-108F-447F-98B1-EA774A0537EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D03738C3-D659-488D-B285-64A496C0F1FB"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFD9C4F-E93B-4BCE-A5E2-A20945EB8534"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBEBAA2-4892-4F9E-8C0E-94CA90DCD28D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "53D7AE43-A3AC-4B38-B0A3-E6F02834224F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "59FEDCDF-9FBF-4D08-A50F-FF92763DFC21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "54A11B3A-547C-4F2F-A58E-DE06DBBE8115"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7243D80-913D-405C-9988-B8473DB1A5DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C6D399-FF31-441D-A363-BD53CFE5569A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9818A6FB-2CF5-4236-8EFE-95458D603CC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "73CC0582-D889-4907-A32E-218AC2B0591F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5DD6CF-CCC7-40DD-A6CA-B9BBC339998F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*",
"matchCriteriaId": "381DD10A-3459-40BD-88DB-2CC0BCA63F4C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.2:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "1E2BC096-43B6-4696-8467-CC3D0163EFF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.3:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "3A29D4B9-DD00-43F6-ACEA-B830FDFC1E5C"
}
]
}
]
}
],
"references": [
{
"url": "http://service.real.com/realplayer/security/12102010_player/en/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2010-0981.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securitytracker.com/id?1024861",
"source": "cve@mitre.org"
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-274",
"source": "cve@mitre.org"
}
]
}