CVE-2002-1643
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/12/2002
Last modified:
03/04/2025
Description
Multiple buffer overflows in RealNetworks Helix Universal Server 9.0 (9.0.2.768) allow remote attackers to execute arbitrary code via (1) a long Transport field in a SETUP RTSP request, (2) a DESCRIBE RTSP request with a long URL argument, or (3) two simultaneous HTTP GET requests with long arguments.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:realnetworks:helix_universal_server:9.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:helix_universal_server:9.0.2.768:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.kb.cert.org/vuls/id/974689
- http://www.nextgenss.com/advisories/realhelix.txt
- http://www.securityfocus.com/archive/1/304203
- http://www.securityfocus.com/bid/6454
- http://www.securityfocus.com/bid/6456
- http://www.securityfocus.com/bid/6458
- http://www.service.real.com/help/faq/security/bufferoverrun12192002.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/10915
- https://exchange.xforce.ibmcloud.com/vulnerabilities/10916
- https://exchange.xforce.ibmcloud.com/vulnerabilities/10917
- http://www.kb.cert.org/vuls/id/974689
- http://www.nextgenss.com/advisories/realhelix.txt
- http://www.securityfocus.com/archive/1/304203
- http://www.securityfocus.com/bid/6454
- http://www.securityfocus.com/bid/6456
- http://www.securityfocus.com/bid/6458
- http://www.service.real.com/help/faq/security/bufferoverrun12192002.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/10915
- https://exchange.xforce.ibmcloud.com/vulnerabilities/10916
- https://exchange.xforce.ibmcloud.com/vulnerabilities/10917