CVE-2006-6026
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
21/11/2006
Last modified:
09/04/2025
Description
Heap-based buffer overflow in Real Networks Helix Server and Helix Mobile Server before 11.1.3, and Helix DNA Server 11.0 and 11.1, allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a DESCRIBE request that contains an invalid LoadTestPassword field.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:realnetworks:helix_dna_server:11.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:helix_dna_server:11.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:helix_mobile_server:*:*:*:*:*:*:*:* | 11.1.2 (including) | |
cpe:2.3:a:realnetworks:helix_server:*:*:*:*:*:*:*:* | 11.1.2 (including) | |
cpe:2.3:a:realnetworks:helix_server:11.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:helix_server:11.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://docs.real.com/docs/security/SecurityUpdate032107Server.pdf
- http://gleg.net/helix.txt
- http://lists.helixcommunity.org/pipermail/server-cvs/2007-January/003783.html
- http://secunia.com/advisories/22944
- http://web.archive.org/web/20060502082622/www.gleg.net/vulndisco_pack_professional.shtml
- http://www.attrition.org/pipermail/vim/2007-March/001459.html
- http://www.attrition.org/pipermail/vim/2007-March/001468.html
- http://www.securityfocus.com/archive/1/463333/100/0/threaded
- http://www.securityfocus.com/bid/21141
- http://www.securityfocus.com/bid/23068
- http://www.vupen.com/english/advisories/2007/1056
- https://www.exploit-db.com/exploits/3531
- http://docs.real.com/docs/security/SecurityUpdate032107Server.pdf
- http://gleg.net/helix.txt
- http://lists.helixcommunity.org/pipermail/server-cvs/2007-January/003783.html
- http://secunia.com/advisories/22944
- http://web.archive.org/web/20060502082622/www.gleg.net/vulndisco_pack_professional.shtml
- http://www.attrition.org/pipermail/vim/2007-March/001459.html
- http://www.attrition.org/pipermail/vim/2007-March/001468.html
- http://www.securityfocus.com/archive/1/463333/100/0/threaded
- http://www.securityfocus.com/bid/21141
- http://www.securityfocus.com/bid/23068
- http://www.vupen.com/english/advisories/2007/1056
- https://www.exploit-db.com/exploits/3531