Vulnerability Details : CVE-2005-2629
Integer overflow in RealNetworks RealPlayer 8, 10, and 10.5, RealOne Player 1 and 2, and Helix Player 10.0.0 allows remote attackers to execute arbitrary code via an .rm movie file with a large value in the length field of the first data packet, which leads to a stack-based buffer overflow, a different vulnerability than CVE-2004-1481.
Vulnerability category: OverflowExecute code
Products affected by CVE-2005-2629
- cpe:2.3:a:realnetworks:realplayer:*:*:enterprise:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:8.0:*:win32:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1040:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1053:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1069:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1056:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0:*:mac_os_x:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1235:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1059:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_player:1.0.3:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_player:1.0.4:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_player:1.0.1:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_player:1.0.2:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_player:1.0.5:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_player:1.0:*:linux:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-2629
37.39%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-2629
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST |
References for CVE-2005-2629
-
http://www.debian.org/security/2005/dsa-915
Patch;Vendor Advisory
-
http://secunia.com/advisories/17860
Patch;Vendor Advisory
-
http://securitytracker.com/id?1015184
-
http://securityreason.com/securityalert/169
-
http://secunia.com/advisories/17514/
Patch;Vendor Advisory
-
http://www.eeye.com/html/research/advisories/AD20051110a.html
Patch;Vendor Advisory
-
http://securitytracker.com/id?1015186
-
http://service.real.com/help/faq/security/051110_player/EN/
Patch
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9550
-
http://marc.info/?l=bugtraq&m=113166476423021&w=2
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/23024
-
http://securitytracker.com/id?1015185
-
http://www.securityfocus.com/bid/15381/
-
http://secunia.com/advisories/17559
About Secunia Research | Flexera
Jump to