Executive Summary

Informations
Name CVE-2005-0455 First vendor Publication 2005-05-02
Vendor Cve Last vendor Modification 2017-10-11

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:P)
Cvss Base Score 5.1 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Stack-based buffer overflow in the CSmil1Parser::testAttributeFailed function in smlparse.cpp for RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1 allows remote attackers to execute arbitrary code via a .SMIL file with a large system-screen-size value.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0455

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10926
 
Oval ID: oval:org.mitre.oval:def:10926
Title: Stack-based buffer overflow in the CSmil1Parser::testAttributeFailed function in smlparse.cpp for RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1 allows remote attackers to execute arbitrary code via a .SMIL file with a large system-screen-size value.
Description: Stack-based buffer overflow in the CSmil1Parser::testAttributeFailed function in smlparse.cpp for RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1 allows remote attackers to execute arbitrary code via a .SMIL file with a large system-screen-size value.
Family: unix Class: vulnerability
Reference(s): CVE-2005-0455
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:

Open Source Vulnerability Database (OSVDB)

Id Description
14305 RealPlayer .smil File Processing Overflow

A buffer overflow exists in RealPlayer. The application fails to validate the contents of .smil files resulting in a stack overflow. With a specially crafted file, a context-dependent attacker can cause arbitrary code execution resulting in a loss of integrity.

Snort® IPS/IDS

Date Description
2014-01-10 RealNetworks RealPlayer SMIL file overflow attempt
RuleID : 3473 - Revision : 24 - Type : FILE-MULTIMEDIA

Nessus® Vulnerability Scanner

Date Description
2005-09-12 Name : The remote Fedora Core host is missing a security update.
File : fedora_2005-188.nasl - Type : ACT_GATHER_INFO
2005-03-21 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2005-299.nasl - Type : ACT_GATHER_INFO
2005-03-09 Name : The remote host is missing a vendor-supplied security patch
File : suse_SA_2005_014.nasl - Type : ACT_GATHER_INFO
2005-03-04 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2005-265.nasl - Type : ACT_GATHER_INFO
2005-03-04 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2005-271.nasl - Type : ACT_GATHER_INFO
2005-03-02 Name : The remote Windows application is affected by several remote overflows.
File : realplayer_multiple_vulns.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CONFIRM http://service.real.com/help/faq/security/050224_player
IDEFENSE http://www.idefense.com/application/poi/display?id=209&type=vulnerabilities
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
REDHAT http://www.redhat.com/support/errata/RHSA-2005-265.html
http://www.redhat.com/support/errata/RHSA-2005-271.html

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
Date Informations
2020-05-23 13:16:45
  • Multiple Updates
2020-05-23 00:16:21
  • Multiple Updates
2017-10-11 09:23:28
  • Multiple Updates
2016-06-28 23:50:08
  • Multiple Updates
2016-04-26 13:17:51
  • Multiple Updates
2014-02-17 10:30:10
  • Multiple Updates
2014-01-19 21:22:34
  • Multiple Updates
2013-05-11 11:21:32
  • Multiple Updates