CVE-2007-4599
Published Oct 31, 2007
Last updated 6 years ago
Overview
- Description
- Stack-based buffer overflow in RealNetworks RealPlayer 10 and possibly 10.5, and RealOne Player 1 and 2, for Windows allows remote attackers to execute arbitrary code via a crafted playlist (PLS) file.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Vendor comments
- Red HatNot vulnerable. This issue did not affect the versions of RealPlayer as shipped with Red Hat Enterprise Linux 3 Extras, 4 Extras, or 5 Supplementary.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:realnetworks:realone_player:1.0:*:windows:en:*:*:*:*", "vulnerable": true, "matchCriteriaId": "880F633E-3833-4E07-91AE-F11E77DC3AF4" }, { "criteria": "cpe:2.3:a:realnetworks:realone_player:2.0:*:windows:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72F332E7-13EA-447D-8116-7CD404120040" }, { "criteria": "cpe:2.3:a:realnetworks:realplayer:10.0:*:windows:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15FABF57-B77B-49FF-BEAF-1E0D6BD4B66F" }, { "criteria": "cpe:2.3:a:realnetworks:realplayer:10.5:6.0.12.1040:windows:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB3CC6D6-334F-4F9C-8A5C-7EC3DCACEC50" }, { "criteria": "cpe:2.3:a:realnetworks:realplayer:10.5:6.0.12.1578:windows:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "414712E9-6901-4D33-B970-36CC238D4257" }, { "criteria": "cpe:2.3:a:realnetworks:realplayer:10.5:6.0.12.1698:windows:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35AAD3FF-B70E-46CB-A3C1-34B2412EE6EC" }, { "criteria": "cpe:2.3:a:realnetworks:realplayer:10.5:6.0.12.1741:windows:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA78969A-CBAE-4B67-96E7-F7EC9FD78E38" } ], "operator": "OR" } ] } ]