Gravité: : Critique
  Identifiant(s) CVE: : CVE-2007-2264
  Date du conseil: 21 juillet 2015

  Description

Heap-based buffer overflow in RealNetworks RealPlayer 8, 10, 10.1, and possibly 10.5; RealOne Player 1 and 2; and RealPlayer Enterprise allows remote attackers to execute arbitrary code via a RAM (.ra or .ram) file with a large size value in the RA header.

  Information Exposure Rating:

Apply associated Trend Micro DPI Rules.

  Solutions

  Trend Micro Deep Security DPI Rule Number: 1002745
  Trend Micro Deep Security DPI Rule Name: 1002745 - RealNetworks RealPlayer Multiple Products RA File Processing Heap Overflow

  Affected software and version:

  • realnetworks realone_player
  • realnetworks realone_player 1.0
  • realnetworks realone_player 2.0
  • realnetworks realplayer 10.0
  • realnetworks realplayer 10.1
  • realnetworks realplayer 10.5
  • realnetworks realplayer 8.0
  • realnetworks realplayer_enterprise