Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2005:014: RealPlayer


Vulnerability Assessment Details

SUSE-SA:2005:014: RealPlayer

Vulnerability Assessment Summary
Check for the version of the RealPlayer package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2005:014 (RealPlayer).


Two security problems were found in the media player RealPlayer:

- CVE-2005-0455: A buffer overflow in the handling of .smil files.
- CVE-2005-0611: A buffer overflow in the handling of .wav files.

Both buffer overflows can be exploited remotely by providing URLs
opened by RealPlayer.

More informations can be found on this URL:
http://service.real.com/help/faq/security/050224_player/EN/

This updates fixes the problems.



Solution : http://www.suse.de/security/advisories/2005_14_realplayer.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Hard Drive Disk HDD/SSD External Enclosure Case USB 2.0 Zheino 2.5 Inch
$0.99
Hard Drive Disk HDD/SSD External  Enclosure Case USB 2.0 Zheino 2.5 Inch pictureHot 4 Bay 2.5" to 3.5" HDD SSD Hard Converter Adapter Drive Mounting Bracket
$6.79
Hot 4 Bay 2.5SAMSUNG SSD 850 EVO 500GB 500G SATA III 540MB/S SOLID-STATE HARD DRIVE NEW
$45.99
SAMSUNG SSD 850 EVO 500GB 500G SATA III 540MB/S SOLID-STATE HARD DRIVE NEW pictureUSB 3.0 Transparent 2.5" SATA SSD HDD Hard Disk Drive Enclosure Case XT
$6.8
USB 3.0 Transparent 2.5


Discussions

No Discussions have been posted on this vulnerability.