Vulnerability Details : CVE-2005-2922
Potential exploit
Heap-based buffer overflow in the embedded player in multiple RealNetworks products and versions including RealPlayer 10.x, RealOne Player, and Helix Player allows remote malicious servers to cause a denial of service (crash) and possibly execute arbitrary code via a chunked Transfer-Encoding HTTP response in which either (1) the chunk header length is specified as -1, (2) the chunk header with a length that is less than the actual amount of sent data, or (3) a missing chunk header.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2005-2922
- cpe:2.3:a:realnetworks:realplayer:*:*:enterprise:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:8.0:*:win32:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1040:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1053:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1069:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1056:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1235:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1059:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0.3:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0.4:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0.1:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0.2:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0.0.305:*:mac_os:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0.0.331:*:mac_os:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0.5:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0.6:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:realone_player:*:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realone_player:0.288:*:mac_os_x:*:*:*:*:*
- cpe:2.3:a:realnetworks:realone_player:0.297:*:mac_os_x:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_player:10.0.2:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_player:10.0.3:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_player:10.0.4:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_player:10.0.1:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_player:10.0:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_player:10.0.5:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_player:10.0.6:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:rhapsody:3.0_build_0.815:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:rhapsody:3.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-2922
2.39%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 88 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-2922
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2005-2922
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2005-2922
-
http://www.redhat.com/support/errata/RHSA-2005-762.html
SupportPatch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2005-788.html
Patch;Vendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11444
-
http://www.novell.com/linux/security/advisories/2006_18_realplayer.html
Patch;Vendor Advisory
-
http://www.securityfocus.com/bid/17202
Exploit
-
http://www.vupen.com/english/advisories/2006/1057
Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25409
-
http://www.service.real.com/realplayer/security/03162006_player/en/
Patch
-
http://securitytracker.com/id?1015808
-
http://www.kb.cert.org/vuls/id/172489
Patch;Third Party Advisory;US Government Resource
Jump to