CVE-2010-0417 – RealPlayer: rule book handling heap corruption
https://notcve.org/view.php?id=CVE-2010-0417
Buffer overflow in common/util/rlstate.cpp in Helix Player 1.0.6 and RealPlayer allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a RuleBook structure with a large number of rule-separator characters that trigger heap memory corruption. Desbordamiento de búfer en common/util/rlstate.cpp en Helix Player v1.0.6 y RealPlayer, permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) o posiblemente la ejecución de código de su elección a través de una estructura RuleBook con un elevado número de caracteres de rule-separator (Separador de reglas) que provocan una corrupción de memoria dinámica (heap). • http://lists.helixcommunity.org/pipermail/common-cvs/2008-January/015484.html http://secunia.com/advisories/38450 http://www.redhat.com/support/errata/RHSA-2010-0094.html https://bugzilla.redhat.com/show_bug.cgi?id=561860 https://helixcommunity.org/viewcvs/common/util/rlstate.cpp?view=log#rev1.10 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11364 https://access.redhat.com/security/cve/CVE-2010-0417 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2010-0416 – Helix Player 11.0.2 - Encoded URI Processing Buffer Overflow
https://notcve.org/view.php?id=CVE-2010-0416
Buffer overflow in the Unescape function in common/util/hxurl.cpp and player/hxclientkit/src/CHXClientSink.cpp in Helix Player 1.0.6 and RealPlayer allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a URL argument containing a % (percent) character that is not followed by two hex digits. Desbordamiento de búfer en la función Unescape en common/util/hxurl.cpp y player/hxclientkit/src/CHXClientSink.cpp en Helix Player v1.0.6 y RealPlayer, permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) o posiblemente la ejecución de código de su elección a través de un argumento URL que contiene caracteres de % (porcentaje) que no están seguidos por dos dígitos hexadecimales. • https://www.exploit-db.com/exploits/33620 http://lists.helixcommunity.org/pipermail/common-cvs/2007-July/014956.html http://secunia.com/advisories/38450 http://www.redhat.com/support/errata/RHSA-2010-0094.html https://bugzilla.redhat.com/show_bug.cgi?id=561856 https://helixcommunity.org/viewcvs/common/util/hxurl.cpp?view=log#rev1.24.4.1.4.1 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10847 https://access.redhat.com/security/cve/CVE-2010 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-4904 – RealPlayer 11 - '.au' Denial of Service
https://notcve.org/view.php?id=CVE-2007-4904
RealNetworks RealPlayer 10.1.0.3114 and earlier, and Helix Player 1.0.6.778 on Fedora Core 6 (FC6) and possibly other platforms, allow user-assisted remote attackers to cause a denial of service (application crash) via a malformed .au file that triggers a divide-by-zero error. RealNetworks RealPlayer 10.1.0.3114 y anteriores, y Helix Player 1.0.6.778 sobre Fedora Core 6 (FC6) y posiblemente otras plataformas, permite a atacantes remotos con la intervención del usuario provocar denegación de servicio (caida de aplicación) a través de un archivo malformado .au que dispara un error de división por cero. • https://www.exploit-db.com/exploits/4683 http://archives.neohapsis.com/archives/fulldisclosure/2007-09/0154.html http://osvdb.org/39904 http://www.securityfocus.com/archive/1/479081/100/0/threaded http://www.securityfocus.com/bid/25627 https://exchange.xforce.ibmcloud.com/vulnerabilities/36545 • CWE-189: Numeric Errors •
CVE-2005-0755
https://notcve.org/view.php?id=CVE-2005-0755
Heap-based buffer overflow in RealPlayer 10 and earlier, Helix Player before 10.0.4, and RealOne Player v1 and v2 allows remote attackers to execute arbitrary code via a long hostname in a RAM file. • http://marc.info/?l=bugtraq&m=111401615202987&w=2 http://pb.specialised.info/all/adv/real-ram-adv.txt http://service.real.com/help/faq/security/050419_player/EN http://www.redhat.com/archives/fedora-announce-list/2005-April/msg00040.html http://www.redhat.com/support/errata/RHSA-2005-363.html http://www.redhat.com/support/errata/RHSA-2005-392.html http://www.redhat.com/support/errata/RHSA-2005-394.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg& •