Vulnerability Details : CVE-2008-1309
Public exploit exists!
The RealAudioObjects.RealAudio ActiveX control in rmoc3260.dll in RealNetworks RealPlayer Enterprise, RealPlayer 10, RealPlayer 10.5 before build 6.0.12.1675, and RealPlayer 11 before 11.0.3 build 6.0.14.806 does not properly manage memory for the (1) Console or (2) Controls property, which allows remote attackers to execute arbitrary code or cause a denial of service (browser crash) via a series of assignments of long string values, which triggers an overwrite of freed heap memory.
Vulnerability category: Execute codeDenial of service
Products affected by CVE-2008-1309
- cpe:2.3:a:realnetworks:realplayer:*:*:enterprise:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:11:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-1309
97.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2008-1309
-
RealPlayer rmoc3260.dll ActiveX Control Heap Corruption
Disclosure Date: 2008-03-08First seen: 2020-04-26exploit/windows/browser/realplayer_consoleThis module exploits a heap corruption vulnerability in the RealPlayer ActiveX control. By sending a specially crafted string to the 'Console' property in the rmoc3260.dll control, an attacker may be able to execute arbitrary code. Authors: - Elazar Broad
CVSS scores for CVE-2008-1309
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2008-1309
-
Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2008-1309
-
Red Hat 2008-03-18Not vulnerable. This issue did not affect versions of RealPlayer as shipped with Red Hat Enterprise Linux 3 Extras, 4 Extras, or 5 Supplementary.
References for CVE-2008-1309
-
https://www.exploit-db.com/exploits/5332
-
http://www.kb.cert.org/vuls/id/831457
US Government Resource
-
http://www.zerodayinitiative.com/advisories/ZDI-08-047/
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41087
-
http://www.securitytracker.com/id?1019576
-
http://lists.grok.org.uk/pipermail/full-disclosure/2008-March/060659.html
-
http://www.vupen.com/english/advisories/2008/2194/references
Vendor Advisory
-
http://www.securityfocus.com/bid/28157
RealNetworks RealPlayer 'rmoc3260.dll' ActiveX Control Memory Corruption VulnerabilityExploit
-
http://www.securityfocus.com/archive/1/494779/100/0/threaded
-
http://www.vupen.com/english/advisories/2008/0842
Vendor Advisory
-
http://service.real.com/realplayer/security/07252008_player/en/
Vendor Advisory
-
http://www.securitytracker.com/id?1020563
Jump to