Vulnerabilities > CVE-2006-1370 - Products Multiple Buffer Overflow vulnerability in RealNetworks
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Buffer overflow in RealNetworks RealPlayer 10.5 6.0.12.1040 through 6.0.12.1348, RealPlayer 10, RealOne Player v2, RealOne Player v1, RealPlayer 8, and RealPlayer Enterprise before 20060322 allows remote attackers to have an unknown impact via a malicious Mimio boardCast (mbc) file. This vulnerability affects all versions of RealNetworks, RealPlayer from 10.5 v6.0.12.1040 through 10.5 v6.0.12.1348.
Vulnerable Configurations
Nessus
NASL family | Windows |
NASL id | REALPLAYER_6_0_12_1483.NASL |
description | According to its build number, the installed version of RealPlayer / RealOne Player / RealPlayer Enterprise on the remote Windows host suffers from one or more buffer overflows involving maliciously- crafted SWF and MBC files as well as web pages. In addition, it also may be affected by a local privilege escalation issue. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21140 |
published | 2006-03-24 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/21140 |
title | RealPlayer for Windows < Build 6.0.12.1483 Multiple Vulnerabilities |
code |
|
Saint
bid | 17202 |
description | RealPlayer invalid chunk header heap overflow |
id | misc_realplayer |
osvdb | 24062 |
title | realplayer_chunk_header |
type | client |
References
- http://secunia.com/advisories/19358
- http://securitytracker.com/id?1015810
- http://www.kb.cert.org/vuls/id/451556
- http://www.securityfocus.com/bid/17202
- http://www.service.real.com/realplayer/security/03162006_player/en/
- http://www.vupen.com/english/advisories/2006/1057
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25411