Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> Rhapsody SWF Buffer Overflow Vulnerability


Vulnerability Assessment Details

Rhapsody SWF Buffer Overflow Vulnerability

Vulnerability Assessment Summary
Checks version of Rhapsody

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote Windows application is affected by a buffer overflow flaw.

Description :

According to its version number, the installed version of Rhapsody on
the remote host suffers from a buffer overflow involving SWF files.
To exploit this issue, a remote attacker needs to convince a user to
attempt to play a maliciously-crafted SWF file using the affected
application.

See also :

http://service.real.com/realplayer/security/03162006_player/en/

Solution :

Upgrade to Rhapsody 3 build 1.0.270 or later.

Network Security Threat Level:

High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)

Networks Security ID: 17202

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

128GB SSD MacBook Pro Air 2013 2014 2015 Scan Disk Flash Drive Hard Drive
$100.0
128GB SSD MacBook Pro Air 2013 2014 2015 Scan Disk Flash Drive Hard Drive pictureGENUINE LITE-ON 128GB LJT-128L6G SOLID STATE DRIVE SSD 0Y48CM
$55.0
GENUINE LITE-ON 128GB LJT-128L6G SOLID STATE DRIVE SSD 0Y48CM pictureSamsung PM851 -- 128GB SSD -- Solid State Drive -- M.2 -- MZNTE128HMGR
$45.0
Samsung PM851 -- 128GB SSD -- Solid State Drive -- M.2 -- MZNTE128HMGR pictureCrucial MX300 2.5-Inch-525GB SSD(solid state drive)NEW
$129.99
Crucial MX300 2.5-Inch-525GB SSD(solid state drive)NEW picture


Discussions

No Discussions have been posted on this vulnerability.