CVE-2010-1317
Published Apr 20, 2010
Last updated 15 years ago
Overview
- Description
- Heap-based buffer overflow in the NTLM authentication functionality in RealNetworks Helix Server and Helix Mobile Server 11.x, 12.x, and 13.x allows remote attackers to have an unspecified impact via invalid base64-encoded data.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:realnetworks:helix_dna_server:11.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3DA85105-4EEB-408B-8F49-DB53CFA74B54" }, { "criteria": "cpe:2.3:a:realnetworks:helix_dna_server:11.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C146CADF-9F82-41F6-9351-A5A9E283F4DB" }, { "criteria": "cpe:2.3:a:realnetworks:helix_dna_server:11.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F29AEFF-C8B6-4142-8B55-1670843B5B12" }, { "criteria": "cpe:2.3:a:realnetworks:helix_dna_server:11.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92FDC239-FB0D-4DB7-AA2E-D97CC702FDFE" }, { "criteria": "cpe:2.3:a:realnetworks:helix_dna_server:12.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D908992-FB57-4179-80EC-24834D96EF15" }, { "criteria": "cpe:2.3:a:realnetworks:helix_dna_server:13.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7BAAA23-D267-45C2-8989-AD9DE4854217" }, { "criteria": "cpe:2.3:a:realnetworks:helix_server:11.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A30A2490-21FC-4C0D-80A3-B89E6F58E93A" }, { "criteria": "cpe:2.3:a:realnetworks:helix_server:11.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2954F6FF-357E-4E76-B135-DECDED4241B6" }, { "criteria": "cpe:2.3:a:realnetworks:helix_server:12.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0890EDD4-63FF-43EC-9EC4-852B34E00F51" }, { "criteria": "cpe:2.3:a:realnetworks:helix_server:13.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DFAFCD3-1B0A-47D3-9A52-F239A2DD5031" }, { "criteria": "cpe:2.3:a:realnetworks:helix_server_mobile:11.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74F01F2C-036C-4B6E-B66D-F0870801D397" }, { "criteria": "cpe:2.3:a:realnetworks:helix_server_mobile:12.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CB773CC-C81C-424A-9493-4CAD2E0E8262" }, { "criteria": "cpe:2.3:a:realnetworks:helix_server_mobile:13.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F8EAA7F-6191-4B5B-AE3C-335C6D5897E1" } ], "operator": "OR" } ] } ]