RealNetworks RealOne Player/RealPlayer Remote R3T文件基于栈的缓冲区溢出漏洞

admin 2022-07-22 12:28:26 CNNVD漏洞 来源:ZONE.CI 全球网 0 阅读模式

漏洞信息详情

RealNetworks RealOne Player/RealPlayer Remote R3T文件基于栈的缓冲区溢出漏洞

  • CNNVD编号:CNNVD-200406-031
  • 危害等级: 中危
  • CVE编号: CVE-2004-0387
  • 漏洞类型: 缓冲区溢出
  • 发布时间: 2004-06-01
  • 威胁类型: 远程
  • 更新时间: 2006-01-05
  • 厂        商: realnetworks
  • 漏洞来源: This issue was dis...

漏洞简介

使用于RealPlayer 8, RealOne Player,RealOne Player 10 测试版和RealOne Player企业版的RT3插件存在基于栈的缓冲区溢出漏洞。远程攻击者借助畸形.R3T文件执行任意代码。

漏洞公告

Real Networks Inc. has released an advisory and fixes dealing with this issue. Please see the referenced web page for more information and details on obtaining fixes.

参考网址

来源: XF 名称: realplayer-r3t-bo(15774) 链接:http://xforce.iss.net/xforce/xfdb/15774 来源: www.service.real.com 链接:http://www.service.real.com/help/faq/security/040406_r3t/en/ 来源: www.ngssoftware.com 链接:http://www.ngssoftware.com/advisories/realr3t.txt 来源: BUGTRAQ 名称: 20040307 REAL One Player R3T File Format Stack Overflow 链接:http://marc.theaimsgroup.com/?l=bugtraq&m=108135350810135&w=2 来源: BID 名称: 10070 链接:http://www.securityfocus.com/bid/10070 来源: OSVDB 名称: 4977 链接:http://www.osvdb.org/displayvuln.php?osvdb_id=4977 来源: SECUNIA 名称: 11314 链接:http://secunia.com/advisories/11314 来源: BUGTRAQ 名称: 20040307 REAL One Player R3T File Format Stack Overflow 链接:http://marc.theaimsgroup.com/?l=bugtraq&m=108135350810135&w=2 来源: VULNWATCH 名称: 20040307 REAL One Player R3T File Format Stack Overflow 链接:http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0077.HTML

受影响实体

  • Realnetworks Realone_player  
  • Realnetworks Realone_player:Enterprise  
  • Realnetworks Realone_player:10_beta  
  • Realnetworks Realplayer:8.0  

补丁

    暂无

weinxin
特别声明
本站(ZONE.CI)所有文章仅供技术研究,若将其信息做其他用途,由用户承担全部法律及连带责任,本站不承担任何法律及连带责任,请遵守中华人民共和国安全法.
评论:0   参与:  0