Vulnerabilities > CVE-2003-0725 - Unspecified vulnerability in Realnetworks Helix Universal Server and Realserver
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Buffer overflow in the RTSP protocol parser for the View Source plug-in (vsrcplin.so or vsrcplin3260.dll) for RealNetworks Helix Universal Server 9 and RealSystem Server 8, 7 and RealServer G2 allows remote attackers to execute arbitrary code.
Vulnerable Configurations
Exploit-Db
description | Real Server 7/8/9 Remote Root Exploit (Windows & Linux). CVE-2003-0725. Remote exploits for multiple platform |
id | EDB-ID:86 |
last seen | 2016-01-31 |
modified | 2003-08-25 |
published | 2003-08-25 |
reporter | Johnny Cyberpunk |
source | https://www.exploit-db.com/download/86/ |
title | Real Server 7/8/9 - Remote Root Exploit Windows & Linux |
Nessus
NASL family | Gain a shell remotely |
NASL id | HELIX_OVERFLOW.NASL |
description | The remote host is running RealServer or Helix Universal Server, media streaming servers. According to its banner, the version of the server installed on the remote host may be affected by a buffer overflow vulnerability when handling URLs with many |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11642 |
published | 2003-05-21 |
reporter | This script is Copyright (C) 2003-2018 Montgomery County Maryland Government Security Team |
source | https://www.tenable.com/plugins/nessus/11642 |
title | Helix Servers View Source Plug-in RTSP Parser Overflow |
code |
|
References
- http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0087.html
- http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0087.html
- http://lists.immunitysec.com/pipermail/dailydave/2003-August/000030.html
- http://lists.immunitysec.com/pipermail/dailydave/2003-August/000030.html
- http://www.kb.cert.org/vuls/id/934932
- http://www.kb.cert.org/vuls/id/934932
- http://www.securityfocus.com/bid/8476
- http://www.securityfocus.com/bid/8476
- http://www.service.real.com/help/faq/security/rootexploit082203.html
- http://www.service.real.com/help/faq/security/rootexploit082203.html