Executive Summary
Summary | |
---|---|
Title | HelixPlayer removal |
Informations | |||
---|---|---|---|
Name | RHSA-2010:0981 | First vendor Publication | 2010-12-14 |
Vendor | RedHat | Last vendor Modification | 2010-12-14 |
Severity (Vendor) | Critical | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Helix Player contains multiple security flaws and should no longer be used. This update removes the HelixPlayer package from Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ppc, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, x86_64 Red Hat Enterprise Linux WS version 4 - i386, x86_64 3. Description: Helix Player is a media player. Multiple security flaws were discovered in RealPlayer. Helix Player and RealPlayer share a common source code base; therefore, some of the flaws discovered in RealPlayer may also affect Helix Player. Some of these flaws could, when opening, viewing, or playing a malicious media file or stream, lead to arbitrary code execution with the privileges of the user running Helix Player. (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4384, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392) The Red Hat Security Response Team is unable to properly determine the impact or fix all of these issues in Helix Player, due to the source code for RealPlayer being unavailable. Due to the security concerns this update removes the HelixPlayer package from Red Hat Enterprise Linux 4. Users wishing to continue to use Helix Player should download it directly from https://player.helixcommunity.org/ 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 662772 - CVE-2010-4384 HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392) |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2010-0981.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
70 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
10 % | CWE-399 | Resource Management Errors |
10 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
10 % | CWE-20 | Improper Input Validation |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-07-30 | Name : CentOS Update for HelixPlayer-uninstall CESA-2010:0981 centos4 x86_64 File : nvt/gb_CESA-2010_0981_HelixPlayer-uninstall_centos4_x86_64.nasl |
2011-08-09 | Name : CentOS Update for HelixPlayer-uninstall CESA-2010:0981 centos4 i386 File : nvt/gb_CESA-2010_0981_HelixPlayer-uninstall_centos4_i386.nasl |
2010-12-29 | Name : RealNetworks RealPlayer Multiple Vulnerabilities (Linux) - Dec 10 File : nvt/gb_realplayer_mult_vuln_lin_dec10.nasl |
2010-12-29 | Name : RealNetworks RealPlayer Multiple Vulnerabilities (Win) - Dec10 File : nvt/gb_realplayer_mult_vuln_win_01_dec10.nasl |
2010-12-29 | Name : RealNetworks RealPlayer Multiple Vulnerabilities (Win) - Dec10 File : nvt/gb_realplayer_mult_vuln_win_03_dec10.nasl |
2010-12-29 | Name : RealNetworks RealPlayer Multiple Vulnerabilities (Win) - Dec10 File : nvt/gb_realplayer_mult_vuln_win_04_dec10.nasl |
2010-12-29 | Name : RealNetworks RealPlayer Multiple Vulnerabilities (Win) - Dec10 File : nvt/gb_realplayer_mult_vuln_win_dec10.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
69852 | RealPlayer Multiple Products RealMedia File Crafted ImageMap Data Overflow RealPlayer is prone to an overflow condition. The program fails to properly decode data for a particular mime type within a RealMedia file resulting in a heap-based buffer overflow. With specially crafted ImageMap data in a RealMedia file, a context-dependent attacker can potentially execute arbitrary code. |
69847 | RealPlayer Multiple Products Crafted RealMedia Video File Memory Corruption A memory corruption flaw exists in RealPlayer. The program fails to sanitize user-supplied input when processing RealMedia video files, resulting in memory corruption. With a specially crafted RealMedia video file, a context-dependent attacker can execute arbitrary code. |
69846 | RealPlayer Multiple Products SIPR Stream Crafted Frame Dimensions Remote Over... RealPlayer is prone to an overflow condition. The drv1.dll module fails to properly sanitize user-supplied input resulting in an integer overflow. With a specially crafted .rm file, a context-dependent attacker can potentially execute arbitrary code. |
69845 | RealPlayer Multiple Products RealMedia File MDPR Header Array Index Error Arb... A memory corruption flaw exists in RealPlayer. The program fails to sanitize user-supplied input containing a malformed Media Properties Header (MDPR) resulting in memory corruption. With a specially crafted MDPR in a RealMedia file, a context-dependent attacker can execute arbitrary code. |
69844 | RealPlayer Multiple Products Crafted RA5 File Handling Overflow RealPlayer is prone to an overflow condition. The program fails to properly sanitize user-supplied input resulting in a heap-based buffer overflow. With a specially crafted RA5 file, a context-dependent attacker can potentially cause an unspecified impact. |
69843 | RealPlayer Multiple Products Crafted RealMedia File Handling Multiple Remote ... RealPlayer is prone to an overflow condition. The program fails to properly sanitize user-supplied input resulting in a heap-based buffer overflow. With a specially crafted RealMedia file, a context-dependent attacker can potentially cause an unspecified impact. |
69840 | RealPlayer Multiple Products Crafted SIPR Handling Overflow RealPlayer is prone to an overflow condition. The program fails to properly sanitize user-supplied input resulting in a heap-based buffer overflow. With a specially crafted SIPR file, a context-dependent attacker can potentially cause an unspecified impact. |
69839 | RealPlayer Multiple Products RV20 Decompression Module Video Stream Length Fi... A memory corruption flaw exists in RealPlayer. The drv2.dll module fails to sanitize user-supplied input when large values are specified for the length field, resulting in memory corruption. With a specially crafted RV20 video stream, a context-dependent attacker can execute arbitrary code. |
69836 | RealPlayer Multiple Products Audio Stream Multi-rate Data Remote Overflow RealPlayer is prone to an overflow condition. The program fails to properly sanitize user-supplied input resulting in a heap-based buffer overflow. With a specially crafted multi-rate audio stream, a context-dependent attacker can potentially execute arbitrary code. |
69834 | RealPlayer Multiple Products ICY SHOUTcast Stream StreamTitle Tag Use-after-f... A memory corruption flaw exists in RealPlayer.An error in the processing of the "StreamTitle" tag in a SHOUTcast stream using the ICY protocol may be exploited to cause memory corruption. With a specially crafted StreamTitle tag in an ICY SHOUTcast stream a context-dependent attacker can execute arbitrary code. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-07-12 | Name : The remote Oracle Linux host has a deprecated application. File : oraclelinux_ELSA-2010-0981.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20101214_HelixPlayer_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2011-01-28 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2010-0981.nasl - Type : ACT_GATHER_INFO |
2010-12-15 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2010-0981.nasl - Type : ACT_GATHER_INFO |
2010-11-16 | Name : An application on the remote Windows host is affected by multiple vulnerabili... File : realplayer_12_0_1_609.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:54:11 |
|