CVE-2005-0611
CVSS5.1
发布时间 :2005-05-02 00:00:00
修订时间 :2016-10-17 23:13:02
NMCOS    

[原文]Heap-based buffer overflow in RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1, allows remote attackers to execute arbitrary code via .WAV files.


[CNNVD]RealOne Player/Real .WAV缓冲区溢出漏洞(CNNVD-200505-261)

        RealPlayer/RealOne的WAV文件格式解析器在处理畸形.wav文件时存在问题,远程攻击者可以利用这个漏洞构建恶意文件,诱使用户处理,以用户进程在系统上执行任意指令。

- CVSS (基础分值)

CVSS分值: 5.1 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:realnetworks:helix_player
cpe:/a:realnetworks:realone_player:2.0
cpe:/a:realnetworks:realplayer:::enterprise
cpe:/a:realnetworks:realplayer:8.0
cpe:/a:realnetworks:realplayer:10.5RealNetworks RealPlayer 10.5
cpe:/a:realnetworks:realone_player:1.0
cpe:/a:realnetworks:realplayer:10.0RealNetworks RealPlayer 10.0

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:11419Heap-based buffer overflow in RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1, allows remote att...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0611
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0611
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-261
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=110979465912834&w=2
(UNKNOWN)  BUGTRAQ  20050302 RealOne Player / Real .WAV Heap Overflow File Format Vulnerability
http://marc.info/?l=vulnwatch&m=110977858619314&w=2
(UNKNOWN)  VULNWATCH  20050302 RealOne Player / Real .WAV Heap Overflow File Format Vulnerability
http://service.real.com/help/faq/security/050224_player/EN/
(UNKNOWN)  CONFIRM  http://service.real.com/help/faq/security/050224_player/EN/
http://www.redhat.com/support/errata/RHSA-2005-265.html
(UNKNOWN)  REDHAT  RHSA-2005:265
http://www.redhat.com/support/errata/RHSA-2005-271.html
(UNKNOWN)  REDHAT  RHSA-2005:271

- 漏洞信息

RealOne Player/Real .WAV缓冲区溢出漏洞
中危 缓冲区溢出
2005-05-02 00:00:00 2006-01-05 00:00:00
远程  
        RealPlayer/RealOne的WAV文件格式解析器在处理畸形.wav文件时存在问题,远程攻击者可以利用这个漏洞构建恶意文件,诱使用户处理,以用户进程在系统上执行任意指令。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        http://service.real.com/help/faq/security/050224_player/EN/win32patch.rnx" target="_blank"

- 漏洞信息

14306
RealPlayer .wav File Processing Overflow
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-03-01 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

RealNetworks RealOne Player/RealPlayer Unspecified WAV File Processing Buffer Overflow Vulnerability
Boundary Condition Error 12697
Yes No
2005-03-01 12:00:00 2009-07-12 10:56:00
Discovery of this vulnerability is credited to Mark Litchfield of NGSSoftware.

- 受影响的程序版本

RedHat Enterprise Linux WS 3
RedHat Enterprise Linux ES 3
RedHat Desktop 3.0
Red Hat Enterprise Linux AS 3
Real Networks RealPlayer For Unix 10.0.3
+ S.u.S.E. Linux Personal 9.3
+ S.u.S.E. Linux Personal 9.2
Real Networks RealPlayer Enterprise 1.6
Real Networks RealPlayer Enterprise 1.5
Real Networks RealPlayer Enterprise 1.2
Real Networks RealPlayer Enterprise 1.1
Real Networks RealPlayer Enterprise
Real Networks RealPlayer 10 for Mac OS 10.0.0.325
Real Networks RealPlayer 10 for Mac OS 10.0.0.305
Real Networks RealPlayer 10 for Mac OS
Real Networks RealPlayer 10 for Linux
Real Networks RealPlayer 10.5 v6.0.12.1056
Real Networks RealPlayer 10.5 v6.0.12.1053
Real Networks RealPlayer 10.5 v6.0.12.1040
Real Networks RealPlayer 10.0
+ S.u.S.E. cvsup-16.1h-43.i586.rpm
+ S.u.S.E. Linux Personal 9.3
+ S.u.S.E. Linux Personal 9.2
Real Networks RealPlayer 8.0 Win32
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 98 SP1
- Microsoft Windows 98
- Microsoft Windows 98SE
- Microsoft Windows ME
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows XP Home
- Microsoft Windows XP Professional
Real Networks RealPlayer 8.0 Unix
- Caldera OpenLinux Workstation 3.1
- Debian Linux 2.2 IA-32
- Debian Linux 2.2 alpha
- HP HP-UX 11.11
- HP HP-UX 11.0
- IBM AIX 4.3.3
- IBM AIX 4.3.2
- IBM AIX 4.3.1
- IBM AIX 4.3
- IBM AIX 4.2.1
- IBM AIX 4.2
- Mandriva Linux Mandrake 8.0
- Mandriva Linux Mandrake 7.2
- RedHat Linux 7.2 i386
- RedHat Linux 7.1 i386
- RedHat Linux 7.0 i386
- RedHat Linux 6.2 sparc
- RedHat Linux 6.2 i386
- RedHat Linux 6.2 alpha
+ S.u.S.E. Linux 8.1
- S.u.S.E. Linux 7.2 i386
- S.u.S.E. Linux 7.1 x86
- S.u.S.E. Linux 7.1
- S.u.S.E. Linux 7.0 i386
+ S.u.S.E. Linux Desktop 1.0
+ S.u.S.E. Linux Personal 9.1
+ S.u.S.E. Linux Personal 9.0 x86_64
+ S.u.S.E. Linux Personal 9.0
+ S.u.S.E. Linux Personal 8.2
- SCO eDesktop 2.4
- SGI IRIX 6.5.14
- SGI IRIX 6.5.13 m
- SGI IRIX 6.5.13 f
- SGI IRIX 6.5.13
- SGI IRIX 6.5.12 m
- SGI IRIX 6.5.12 f
- SGI IRIX 6.5.12
- SGI IRIX 6.5.11 m
- SGI IRIX 6.5.11 f
- SGI IRIX 6.5.11
- SGI IRIX 6.3
- Slackware Linux 8.0
- Slackware Linux 7.1
- Slackware Linux 7.0
- Sun Solaris 7.0
- Sun Solaris 2.6
Real Networks RealPlayer 8.0 Mac
Real Networks RealOne Player for OSX 9.0 .297
Real Networks RealOne Player for OSX 9.0 .288
Real Networks RealOne Player 6.0.11 .872
Real Networks RealOne Player 6.0.11 .868
Real Networks RealOne Player 6.0.11 .853
Real Networks RealOne Player 6.0.11 .841
Real Networks RealOne Player 6.0.11 .840
Real Networks RealOne Player 6.0.11 .830
Real Networks RealOne Player 6.0.11 .818
Real Networks RealOne Player 1.0
Real Networks Helix Player for Linux 1.0
Real Networks RealPlayer 10 for Mac OS 10.0 .0.331
Real Networks RealPlayer 10.5 v6.0.12.1059

- 不受影响的程序版本

Real Networks RealPlayer 10 for Mac OS 10.0 .0.331
Real Networks RealPlayer 10.5 v6.0.12.1059

- 漏洞讨论

RealNetworks RealPlayer and RealOne Player are reported prone to an unspecified buffer overflow vulnerability. It is reported that the issue manifests when a malicious WAV file is processed. The vulnerability affects heap-based memory.

A remote attacker may exploit this vulnerability to execute arbitrary code in the context of a user that uses a vulnerable version of the media player to play a malicious WAV file.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

SuSE has released advisory SUSE-SA:2005:014 to address this issue. Please see the attached advisory for details on obtaining and applying fixes.

The vendor has released updates dealing with this issue. Please see the referenced advisory for more information on obtaining the updated packages.

Updates may be applied from within the software by selecting the Check For Update option from the Tools menu.

Red Hat has released advisory RHSA-2005:299-06 containing RealPlayer 10 packages for Red Hat Enterprise Linux 3. Please see the advisory in Web references for more information.


Real Networks RealPlayer For Unix 10.0.3

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站