RealNetworks RealPlayer ActiveX控件越界远程代码执行漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1175364 漏洞类型 缓冲区溢出
发布时间 2011-08-16 更新时间 2011-08-16
CVE编号 CVE-2011-2953 CNNVD-ID CNNVD-201108-308
漏洞平台 N/A CVSS评分 10.0
|漏洞来源
https://www.securityfocus.com/bid/49200
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201108-308
|漏洞详情
RealNetworksRealPlayerActiveX控件存在一个越界安全漏洞,攻击者构建恶意WEB页,诱使用户解析,可以应用程序上下文执行任意代码。
|受影响的产品
RealNetworks RealPlayer SP 1.1.5 RealNetworks RealPlayer SP 1.1.4 RealNetworks RealPlayer SP 1.0.5 RealNetworks RealPlayer SP 1.0.2 RealNetworks RealPlayer SP 1.0.1 RealN
|参考资料

来源:service.real.com
链接:http://service.real.com/realplayer/security/08162011_player/en/
来源:www.zerodayinitiative.com
链接:http://www.zerodayinitiative.com/advisories/ZDI-11-265/
来源:www.zerodayinitiative.com
链接:http://www.zerodayinitiative.com/advisories/ZDI-11-266/
来源:www.zerodayinitiative.com
链接:http://www.zerodayinitiative.com/advisories/ZDI-11-267/
来源:www.zerodayinitiative.com
链接:http://www.zerodayinitiative.com/advisories/ZDI-11-268/
来源:www.zerodayinitiative.com
链接:http://www.zerodayinitiative.com/advisories/ZDI-11-269/
来源:SECUNIA
名称:44014
链接:http://secunia.com/advisories/44014
来源:SECUNIA
名称:45608
链接:http://secunia.com/advisories/45608
来源:NSFOCUS
名称:17560
链接:http://www.nsfocus.net/vulndb/17560
来源:NSFOCUS
名称:17545
链接:http://www.nsfocus.net/vulndb/17545