CVE ID | |
CVSS SCORE | |
AFFECTED VENDORS |
RealNetworks |
AFFECTED PRODUCTS |
Helix Server |
TREND MICRO CUSTOMER PROTECTION | Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['5933']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com |
VULNERABILITY DETAILS |
This vulnerability allows attackers to execute arbitrary code on vulnerable installations of RealNetworks Helix Server. User interaction is not required to exploit this vulnerability. Authentication is not required to exploit this vulnerability. The specific flaw exists within the rmserver.exe process while processing the Proxy-Require header of an RTSP response. The service fails to check the length of the field leading to an exploitable heap based buffer overflow. Exploitation of this vulnerability allows an attacker to execute arbitrary code under the context of the SYSTEM user. |
ADDITIONAL DETAILS | |
DISCLOSURE TIMELINE |
|
CREDIT | Anonymous |