CVE-2010-2996
RealNetworks RealPlayer Malformed IVR Object Index Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Array index error in RealNetworks RealPlayer 11.0 through 11.1 on Windows allows remote attackers to execute arbitrary code via a malformed header in a RealMedia .IVR file.
Error de índice de array en RealNetworks RealPlayer v11.0 hasta la v11.1 en Windows. Permite a atacantes remotos ejecutar código de su elección a través de cabeceras mal formadas en un fichero RealMedia .IVR.
This vulnerability allows attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists when parsing a RealMedia .IVR file containing a malformed data header. The application explicitly trusts an index in this data structure to seek into a list of objects. If one specifies an index outside the bounds of the array, the application will later dereference an object from the calculated pointer and then call it, leading to code execution under the context of the current user.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-08-13 CVE Reserved
- 2010-08-26 CVE Published
- 2024-04-22 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/41154 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/513381/100/0/threaded | Mailing List | |
http://www.securitytracker.com/id?1024370 | Vdb Entry | |
http://www.vupen.com/english/advisories/2010/2216 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-10-166 | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/61425 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6703 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://service.real.com/realplayer/security/08262010_player/en | 2018-10-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Realnetworks Search vendor "Realnetworks" | Realplayer Search vendor "Realnetworks" for product "Realplayer" | 11.0 Search vendor "Realnetworks" for product "Realplayer" and version "11.0" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | * | - |
Safe
|
Realnetworks Search vendor "Realnetworks" | Realplayer Search vendor "Realnetworks" for product "Realplayer" | 11.1 Search vendor "Realnetworks" for product "Realplayer" and version "11.1" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | * | - |
Safe
|