Vulnerability Details : CVE-2004-0387
Stack-based buffer overflow in the RT3 plugin, as used in RealPlayer 8, RealOne Player, RealOne Player 10 beta, and RealOne Player Enterprise, allows remote attackers to execute arbitrary code via a malformed .R3T file.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2004-0387
Probability of exploitation activity in the next 30 days: 33.69%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 96 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2004-0387
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST |
References for CVE-2004-0387
-
http://marc.info/?l=bugtraq&m=108135350810135&w=2
-
http://www.securityfocus.com/bid/10070
-
http://www.service.real.com/help/faq/security/040406_r3t/en/
Patch;Vendor Advisory
-
http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0077.html
-
http://www.ngssoftware.com/advisories/realr3t.txt
Patch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/15774
Products affected by CVE-2004-0387
- cpe:2.3:a:realnetworks:realplayer:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realone_player:*:*:enterprise:*:*:*:*:*
- cpe:2.3:a:realnetworks:realone_player:*:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realone_player:10_beta:*:*:*:*:*:*:*