CVE-2007-2264
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
31/10/2007
Last modified:
09/04/2025
Description
Heap-based buffer overflow in RealNetworks RealPlayer 8, 10, 10.1, and possibly 10.5; RealOne Player 1 and 2; and RealPlayer Enterprise allows remote attackers to execute arbitrary code via a RAM (.ra or .ram) file with a large size value in the RA header.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:realnetworks:realone_player:*:*:mac:en:*:*:*:* | ||
cpe:2.3:a:realnetworks:realone_player:1.0:*:windows:en:*:*:*:* | ||
cpe:2.3:a:realnetworks:realone_player:2.0:*:windows:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:realplayer:8.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:realplayer:10.0:*:windows:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:realplayer:10.0:10.0.0.305:mac:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:realplayer:10.0:10.0.0.331:mac:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:realplayer:10.0:10.0.0.352:mac:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:realplayer:10.0:10.0.5:linux:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:realplayer:10.0:10.0.6:linux:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:realplayer:10.0:10.0.7:linux:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:realplayer:10.0:10.0.8:linux:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:realplayer:10.0:10.0.9:linux:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:realplayer:10.1:10.0.0._481:mac:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:realplayer:10.1:10.0.0.396:mac:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/27361
- http://securitytracker.com/id?1018866=
- http://service.real.com/realplayer/security/10252007_player/en/
- http://www.attrition.org/pipermail/vim/2007-October/001841.html
- http://www.securityfocus.com/archive/1/483113/100/0/threaded
- http://www.securityfocus.com/bid/26214
- http://www.vupen.com/english/advisories/2007/3628
- http://www.zerodayinitiative.com/advisories/ZDI-07-063.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/37437
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9100
- http://secunia.com/advisories/27361
- http://securitytracker.com/id?1018866=
- http://service.real.com/realplayer/security/10252007_player/en/
- http://www.attrition.org/pipermail/vim/2007-October/001841.html
- http://www.securityfocus.com/archive/1/483113/100/0/threaded
- http://www.securityfocus.com/bid/26214
- http://www.vupen.com/english/advisories/2007/3628
- http://www.zerodayinitiative.com/advisories/ZDI-07-063.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/37437
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9100