漏洞信息详情
RealNetworks RealOne Player/RealPlayer Remote R3T文件基于栈的缓冲区溢出漏洞
- CNNVD编号:CNNVD-200406-031
- 危害等级: 中危
- CVE编号: CVE-2004-0387
- 漏洞类型: 缓冲区溢出
- 发布时间: 2004-06-01
- 威胁类型: 远程
- 更新时间: 2006-01-05
- 厂 商: realnetworks
- 漏洞来源: This issue was dis...
漏洞简介
使用于RealPlayer 8, RealOne Player,RealOne Player 10 测试版和RealOne Player企业版的RT3插件存在基于栈的缓冲区溢出漏洞。远程攻击者借助畸形.R3T文件执行任意代码。
漏洞公告
Real Networks Inc. has released an advisory and fixes dealing with this issue. Please see the referenced web page for more information and details on obtaining fixes.
参考网址
来源: XF 名称: realplayer-r3t-bo(15774) 链接:http://xforce.iss.net/xforce/xfdb/15774 来源: www.service.real.com 链接:http://www.service.real.com/help/faq/security/040406_r3t/en/ 来源: www.ngssoftware.com 链接:http://www.ngssoftware.com/advisories/realr3t.txt 来源: BUGTRAQ 名称: 20040307 REAL One Player R3T File Format Stack Overflow 链接:http://marc.theaimsgroup.com/?l=bugtraq&m=108135350810135&w=2 来源: BID 名称: 10070 链接:http://www.securityfocus.com/bid/10070 来源: OSVDB 名称: 4977 链接:http://www.osvdb.org/displayvuln.php?osvdb_id=4977 来源: SECUNIA 名称: 11314 链接:http://secunia.com/advisories/11314 来源: BUGTRAQ 名称: 20040307 REAL One Player R3T File Format Stack Overflow 链接:http://marc.theaimsgroup.com/?l=bugtraq&m=108135350810135&w=2 来源: VULNWATCH 名称: 20040307 REAL One Player R3T File Format Stack Overflow 链接:http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0077.HTML
受影响实体
- Realnetworks Realone_player
- Realnetworks Realone_player:Enterprise
- Realnetworks Realone_player:10_beta
- Realnetworks Realplayer:8.0
补丁
暂无
![weinxin](http://zone.ci/zone_ci_images/zone.ci.png)
评论