// For flags

CVE-2010-4384

RealNetworks RealPlayer Media Properties Header Parsing Remote Code Execution Vulnerability

Severity Score

9.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Array index error in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer Enterprise 2.1.2, Mac RealPlayer 11.0 through 11.1, Linux RealPlayer 11.0.2.1744, and possibly HelixPlayer 1.0.6 and other versions, allows remote attackers to execute arbitrary code via a malformed Media Properties Header (aka MDPR) in a RealMedia file.

Un error de indice de Array en RealNetworks RealPlayer v11.0 a v11.1, RealPlayer Enterprise v2.1.2, Mac RealPlayer v11.0 por v11.1 y Linux RealPlayer v11.0.2.1744 permite a atacantes remotos ejecutar código arbitrario a través de una cabecera de Propiedades Multimedia (conocida como MDPR) mal formada en un archivo de RealMedia.

This vulnerability allows attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists when parsing a RealMedia file containing a malformed Media Properties Header (MDPR). The application explicitly trusts an index in this data structure which is used to seek into an array of objects. If an attacker can allocate controlled data at some point after this array, an attacker can then get their fabricated object to get called leading to code execution under the context of the current user.

*Credits: AnonymousHossein Lotfi
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2010-12-02 CVE Reserved
  • 2010-12-10 CVE Published
  • 2024-08-06 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Realnetworks
Search vendor "Realnetworks"
Realplayer
Search vendor "Realnetworks" for product "Realplayer"
11.0
Search vendor "Realnetworks" for product "Realplayer" and version "11.0"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
*-
Safe
Realnetworks
Search vendor "Realnetworks"
Realplayer
Search vendor "Realnetworks" for product "Realplayer"
11.0.1
Search vendor "Realnetworks" for product "Realplayer" and version "11.0.1"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
*-
Safe
Realnetworks
Search vendor "Realnetworks"
Realplayer
Search vendor "Realnetworks" for product "Realplayer"
11.0.2
Search vendor "Realnetworks" for product "Realplayer" and version "11.0.2"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
*-
Safe
Realnetworks
Search vendor "Realnetworks"
Realplayer
Search vendor "Realnetworks" for product "Realplayer"
11.0.3
Search vendor "Realnetworks" for product "Realplayer" and version "11.0.3"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
*-
Safe
Realnetworks
Search vendor "Realnetworks"
Realplayer
Search vendor "Realnetworks" for product "Realplayer"
11.0.4
Search vendor "Realnetworks" for product "Realplayer" and version "11.0.4"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
*-
Safe
Realnetworks
Search vendor "Realnetworks"
Realplayer
Search vendor "Realnetworks" for product "Realplayer"
11.0.5
Search vendor "Realnetworks" for product "Realplayer" and version "11.0.5"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
*-
Safe
Realnetworks
Search vendor "Realnetworks"
Realplayer
Search vendor "Realnetworks" for product "Realplayer"
11.1
Search vendor "Realnetworks" for product "Realplayer" and version "11.1"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
*-
Safe
Realnetworks
Search vendor "Realnetworks"
Realplayer
Search vendor "Realnetworks" for product "Realplayer"
11.0.2.1744
Search vendor "Realnetworks" for product "Realplayer" and version "11.0.2.1744"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Realnetworks
Search vendor "Realnetworks"
Realplayer
Search vendor "Realnetworks" for product "Realplayer"
11.0
Search vendor "Realnetworks" for product "Realplayer" and version "11.0"
-
Affected
Realnetworks
Search vendor "Realnetworks"
Realplayer
Search vendor "Realnetworks" for product "Realplayer"
11.0.1
Search vendor "Realnetworks" for product "Realplayer" and version "11.0.1"
-
Affected
Realnetworks
Search vendor "Realnetworks"
Realplayer
Search vendor "Realnetworks" for product "Realplayer"
11.0.2
Search vendor "Realnetworks" for product "Realplayer" and version "11.0.2"
-
Affected
Realnetworks
Search vendor "Realnetworks"
Realplayer
Search vendor "Realnetworks" for product "Realplayer"
11.0.3
Search vendor "Realnetworks" for product "Realplayer" and version "11.0.3"
-
Affected
Realnetworks
Search vendor "Realnetworks"
Realplayer
Search vendor "Realnetworks" for product "Realplayer"
11.0.4
Search vendor "Realnetworks" for product "Realplayer" and version "11.0.4"
-
Affected
Realnetworks
Search vendor "Realnetworks"
Realplayer
Search vendor "Realnetworks" for product "Realplayer"
11.0.5
Search vendor "Realnetworks" for product "Realplayer" and version "11.0.5"
-
Affected
Realnetworks
Search vendor "Realnetworks"
Realplayer
Search vendor "Realnetworks" for product "Realplayer"
11.1
Search vendor "Realnetworks" for product "Realplayer" and version "11.1"
-
Affected
Realnetworks
Search vendor "Realnetworks"
Realplayer
Search vendor "Realnetworks" for product "Realplayer"
2.1.2
Search vendor "Realnetworks" for product "Realplayer" and version "2.1.2"
enterprise
Affected