mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
119 lines
4.8 KiB
JSON
119 lines
4.8 KiB
JSON
{
|
|
"id": "CVE-2008-5911",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-01-20T16:00:00.203",
|
|
"lastModified": "2011-03-08T03:15:24.907",
|
|
"vulnStatus": "Modified",
|
|
"evaluatorSolution": "Per: http://docs.real.com/docs/security/SecurityUpdate121508HS.pdf\r\n\r\nThe Fix:\r\nVersion 11.1.8 and Version 12.0.1 of the Helix Server and the Helix Mobile Server have been updated to ensure that the above\r\nvulnerabilities have been resolved.\r\n\r\nSOLUTION:\r\nThe vulnerability is resolved on the following platforms by installing Version 11.1.8 or Version 12.0.1 of the Helix Server and the Helix\r\nMobile Server. This only pertains to supported versions of the platforms listed below. The updated version will be available on your\r\nRealNetworks PAM site after 11:59 p.m. PST, on December 15, 2008.",
|
|
"evaluatorImpact": "Per: http://docs.real.com/docs/security/SecurityUpdate121508HS.pdf\r\n\r\nImpacted Products and Versions:\r\nHelix Server Version 11.x\r\nHelix Server Version 12.x\r\nHelix Mobile Server Version 11.x\r\nHelix Mobile Server Version 12.x",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple buffer overflows in RealNetworks Helix Server and Helix Mobile Server 11.x before 11.1.8 and 12.x before 12.0.1 allow remote attackers to (1) cause a denial of service via three crafted RTSP SETUP commands, or execute arbitrary code via (2) an NTLM authentication request with malformed base64-encoded data, (3) an RTSP DESCRIBE command, or (4) a DataConvertBuffer request."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "M\u00faltiples desbordamientos de b\u00fafer en RealNetworks Helix Server y Helix Mobile Server v11.x anteriores a v11.1.8 y v12.x anteriores a v12.0.1 permite a atacantes remotos (1) provocar una denegaci\u00f3n de servicio a trav\u00e9s de tres comandos manipulados RTSP SETUP, o ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de (2) una petici\u00f3n de autenticaci\u00f3n NTLM con datos malformados codificados en base64, (3) un comando RTSP DESCRIBE, o (4) una petici\u00f3n DataConvertBuffer."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:realnetworks:helix_server:11.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A30A2490-21FC-4C0D-80A3-B89E6F58E93A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:realnetworks:helix_server:12.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0890EDD4-63FF-43EC-9EC4-852B34E00F51"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:realnetworks:helix_server_mobile:11.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "74F01F2C-036C-4B6E-B66D-F0870801D397"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:realnetworks:helix_server_mobile:12.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4CB773CC-C81C-424A-9493-4CAD2E0E8262"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://docs.real.com/docs/security/SecurityUpdate121508HS.pdf",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1021498",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1021499",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1021500",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1021501",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2008/3521",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |