Page 2 of 8 results (0.004 seconds)

CVSS: 5.0EPSS: 85%CPEs: 4EXPL: 3

rmserver in RealNetworks Helix Server and Helix Mobile Server before 13.0.0 allows remote attackers to cause a denial of service (daemon exit) via multiple RTSP SET_PARAMETER requests with empty DataConvertBuffer headers. rmserver en RealNetworks Helix Server y Helix Mobile Server anteriores a v13.0.0 permite a atacantes remotos provocar una denegación de servicio (finaliza el demonio) mediante una petición RTSP SET_PARAMETER múltiple con las cabeceras "DataConvertBuffer" vacías. • https://www.exploit-db.com/exploits/9198 http://docs.real.com/docs/security/SecurityUpdate071409HS.pdf http://osvdb.org/55981 http://www.coresecurity.com/content/real-helix-dna http://www.exploit-db.com/exploits/9198 http://www.securityfocus.com/archive/1/505083/100/0/threaded http://www.securityfocus.com/bid/35731 http://www.vupen.com/english/advisories/2009/1947 • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 85%CPEs: 5EXPL: 3

RealNetworks Helix Server and Helix Mobile Server before 13.0.0 allow remote attackers to cause a denial of service (daemon crash) via an RTSP SETUP request that (1) specifies the / URI or (2) lacks a / character in the URI. RealNetworks Helix Server y Helix Mobile Server anterior a v13.0.0 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) mediante una petición RTSP SETUP (1) especificando la URI / o (2) no poniendo los caracteres / en la URI. • https://www.exploit-db.com/exploits/9198 http://docs.real.com/docs/security/SecurityUpdate071409HS.pdf http://osvdb.org/55982 http://www.coresecurity.com/content/real-helix-dna http://www.exploit-db.com/exploits/9198 http://www.securityfocus.com/archive/1/505083/100/0/threaded http://www.securityfocus.com/bid/35732 http://www.vupen.com/english/advisories/2009/1947 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 54%CPEs: 4EXPL: 0

Multiple buffer overflows in RealNetworks Helix Server and Helix Mobile Server 11.x before 11.1.8 and 12.x before 12.0.1 allow remote attackers to (1) cause a denial of service via three crafted RTSP SETUP commands, or execute arbitrary code via (2) an NTLM authentication request with malformed base64-encoded data, (3) an RTSP DESCRIBE command, or (4) a DataConvertBuffer request. Múltiples desbordamientos de búfer en RealNetworks Helix Server y Helix Mobile Server v11.x anteriores a v11.1.8 y v12.x anteriores a v12.0.1 permite a atacantes remotos (1) provocar una denegación de servicio a través de tres comandos manipulados RTSP SETUP, o ejecutar código de su elección a través de (2) una petición de autenticación NTLM con datos malformados codificados en base64, (3) un comando RTSP DESCRIBE, o (4) una petición DataConvertBuffer. • http://docs.real.com/docs/security/SecurityUpdate121508HS.pdf http://secunia.com/advisories/33360 http://www.securitytracker.com/id?1021498 http://www.securitytracker.com/id?1021499 http://www.securitytracker.com/id?1021500 http://www.securitytracker.com/id?1021501 http://www.vupen.com/english/advisories/2008/3521 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •