CVE-2010-4596
 
Severity Score
9.3
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Stack-based buffer overflow in RealNetworks Helix Server 12.x, 13.x, and 14.x before 14.2, and Helix Mobile Server 12.x, 13.x, and 14.x before 14.2, allows remote attackers to execute arbitrary code via a long string in an RTSP request.
Desbordamiento de búfer basado en pila en RealNetworks Helix Server v12.x, v13.x, v14.x, y antes de v14.2, y Helix Mobile Server v12.x, v13.x, v14.x, y antes de v14.2, permite a atacantes remotos ejecutar código de su elección a través de una cadena larga en una petición RTSP.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2010-12-23 CVE Reserved
- 2011-04-01 CVE Published
- 2024-09-17 CVE Updated
- 2024-11-22 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=899 | Third Party Advisory | |
http://www.securityfocus.com/bid/47109 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://docs.real.com/docs/security/SecurityUpdate033111HS.pdf | 2011-04-06 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Realnetworks Search vendor "Realnetworks" | Helix Server Search vendor "Realnetworks" for product "Helix Server" | 12.0.0 Search vendor "Realnetworks" for product "Helix Server" and version "12.0.0" | - |
Affected
| ||||||
Realnetworks Search vendor "Realnetworks" | Helix Server Search vendor "Realnetworks" for product "Helix Server" | 12.0.1 Search vendor "Realnetworks" for product "Helix Server" and version "12.0.1" | - |
Affected
| ||||||
Realnetworks Search vendor "Realnetworks" | Helix Server Search vendor "Realnetworks" for product "Helix Server" | 13.0.0 Search vendor "Realnetworks" for product "Helix Server" and version "13.0.0" | - |
Affected
| ||||||
Realnetworks Search vendor "Realnetworks" | Helix Server Search vendor "Realnetworks" for product "Helix Server" | 13.1.1 Search vendor "Realnetworks" for product "Helix Server" and version "13.1.1" | - |
Affected
| ||||||
Realnetworks Search vendor "Realnetworks" | Helix Server Search vendor "Realnetworks" for product "Helix Server" | 14.0.0 Search vendor "Realnetworks" for product "Helix Server" and version "14.0.0" | - |
Affected
| ||||||
Realnetworks Search vendor "Realnetworks" | Helix Server Search vendor "Realnetworks" for product "Helix Server" | 14.0.1 Search vendor "Realnetworks" for product "Helix Server" and version "14.0.1" | - |
Affected
| ||||||
Realnetworks Search vendor "Realnetworks" | Helix Mobile Server Search vendor "Realnetworks" for product "Helix Mobile Server" | 12.0 Search vendor "Realnetworks" for product "Helix Mobile Server" and version "12.0" | - |
Affected
| ||||||
Realnetworks Search vendor "Realnetworks" | Helix Mobile Server Search vendor "Realnetworks" for product "Helix Mobile Server" | 13.1.1 Search vendor "Realnetworks" for product "Helix Mobile Server" and version "13.1.1" | - |
Affected
| ||||||
Realnetworks Search vendor "Realnetworks" | Helix Mobile Server Search vendor "Realnetworks" for product "Helix Mobile Server" | 14.0.0 Search vendor "Realnetworks" for product "Helix Mobile Server" and version "14.0.0" | - |
Affected
| ||||||
Realnetworks Search vendor "Realnetworks" | Helix Mobile Server Search vendor "Realnetworks" for product "Helix Mobile Server" | 14.0.1 Search vendor "Realnetworks" for product "Helix Mobile Server" and version "14.0.1" | - |
Affected
|