CVE-2005-2922 (GCVE-0-2005-2922)
Vulnerability from cvelistv5 – Published: 2006-03-23 23:00 – Updated: 2024-08-07 22:53
VLAI?
Summary
Heap-based buffer overflow in the embedded player in multiple RealNetworks products and versions including RealPlayer 10.x, RealOne Player, and Helix Player allows remote malicious servers to cause a denial of service (crash) and possibly execute arbitrary code via a chunked Transfer-Encoding HTTP response in which either (1) the chunk header length is specified as -1, (2) the chunk header with a length that is less than the actual amount of sent data, or (3) a missing chunk header.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T22:53:29.699Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.service.real.com/realplayer/security/03162006_player/en/"
},
{
"name": "19358",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/19358"
},
{
"name": "oval:org.mitre.oval:def:11444",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11444"
},
{
"name": "SUSE-SA:2006:018",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://www.novell.com/linux/security/advisories/2006_18_realplayer.html"
},
{
"name": "ADV-2006-1057",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/1057"
},
{
"name": "1015808",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1015808"
},
{
"name": "RHSA-2005:788",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2005-788.html"
},
{
"name": "realnetworks-chunked-transferencoding-bo(25409)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25409"
},
{
"name": "19365",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/19365"
},
{
"name": "17202",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/17202"
},
{
"name": "VU#172489",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/172489"
},
{
"name": "RHSA-2005:762",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2005-762.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-03-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in the embedded player in multiple RealNetworks products and versions including RealPlayer 10.x, RealOne Player, and Helix Player allows remote malicious servers to cause a denial of service (crash) and possibly execute arbitrary code via a chunked Transfer-Encoding HTTP response in which either (1) the chunk header length is specified as -1, (2) the chunk header with a length that is less than the actual amount of sent data, or (3) a missing chunk header."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-10T00:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.service.real.com/realplayer/security/03162006_player/en/"
},
{
"name": "19358",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/19358"
},
{
"name": "oval:org.mitre.oval:def:11444",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11444"
},
{
"name": "SUSE-SA:2006:018",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://www.novell.com/linux/security/advisories/2006_18_realplayer.html"
},
{
"name": "ADV-2006-1057",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/1057"
},
{
"name": "1015808",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1015808"
},
{
"name": "RHSA-2005:788",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2005-788.html"
},
{
"name": "realnetworks-chunked-transferencoding-bo(25409)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25409"
},
{
"name": "19365",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/19365"
},
{
"name": "17202",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/17202"
},
{
"name": "VU#172489",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/172489"
},
{
"name": "RHSA-2005:762",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2005-762.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-2922",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in the embedded player in multiple RealNetworks products and versions including RealPlayer 10.x, RealOne Player, and Helix Player allows remote malicious servers to cause a denial of service (crash) and possibly execute arbitrary code via a chunked Transfer-Encoding HTTP response in which either (1) the chunk header length is specified as -1, (2) the chunk header with a length that is less than the actual amount of sent data, or (3) a missing chunk header."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.service.real.com/realplayer/security/03162006_player/en/",
"refsource": "CONFIRM",
"url": "http://www.service.real.com/realplayer/security/03162006_player/en/"
},
{
"name": "19358",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19358"
},
{
"name": "oval:org.mitre.oval:def:11444",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11444"
},
{
"name": "SUSE-SA:2006:018",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_18_realplayer.html"
},
{
"name": "ADV-2006-1057",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1057"
},
{
"name": "1015808",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015808"
},
{
"name": "RHSA-2005:788",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-788.html"
},
{
"name": "realnetworks-chunked-transferencoding-bo(25409)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25409"
},
{
"name": "19365",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19365"
},
{
"name": "17202",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17202"
},
{
"name": "VU#172489",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/172489"
},
{
"name": "RHSA-2005:762",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-762.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-2922",
"datePublished": "2006-03-23T23:00:00",
"dateReserved": "2005-09-15T00:00:00",
"dateUpdated": "2024-08-07T22:53:29.699Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:helix_player:10.0:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"E971D8BF-C1B8-4489-9824-D7F1ACBA8DFB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:helix_player:10.0.1:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"42C40382-8A43-47BC-B112-1FF87D513F8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:helix_player:10.0.2:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"41015020-77F1-4604-8F90-1D3398ABF96A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:helix_player:10.0.3:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"8F09FC85-710E-4B98-BB7B-D388F3EB58DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:helix_player:10.0.4:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"0CCEE460-284C-408D-A4FB-A49622004E84\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:helix_player:10.0.5:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"82258764-D89B-482B-BB7E-31D86BD6C586\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:helix_player:10.0.6:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"7621E796-2AF1-447B-B350-74841A85855E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realone_player:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5695A49-561F-434E-92AE-AEF13162BD78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realone_player:0.288:*:mac_os_x:*:*:*:*:*\", \"matchCriteriaId\": \"FA36B216-65D0-490C-8102-7D99D21417CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realone_player:0.297:*:mac_os_x:*:*:*:*:*\", \"matchCriteriaId\": \"CD6C057A-407C-4794-9250-80E07C8E09CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E940DAB-0CD5-4EC0-916F-6C0B2AE26D19\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF6535A6-6647-4E60-B5AA-24DFC06360AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realplayer:*:*:enterprise:*:*:*:*:*\", \"matchCriteriaId\": \"19BC5A59-BCBD-4859-8329-B4974D43DB90\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realplayer:8.0:*:win32:*:*:*:*:*\", \"matchCriteriaId\": \"003D7E29-9970-4984-9756-C070E15B7979\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD49D16C-B0AC-4228-9984-010661596232\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realplayer:10.0.0.305:*:mac_os:*:*:*:*:*\", \"matchCriteriaId\": \"3ADE53B2-53D5-4E84-9CFF-9D7C12727115\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realplayer:10.0.0.331:*:mac_os:*:*:*:*:*\", \"matchCriteriaId\": \"EB4B64DF-7D14-460C-AE2D-02C67575CC9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realplayer:10.0.1:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"382E5B10-AE07-4325-BEE7-7B0432CDF845\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realplayer:10.0.2:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"96897C76-EB4F-49A7-997E-C735CDD2B83A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realplayer:10.0.3:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"10A106E1-78FE-4CA3-9B3B-956B88E758E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realplayer:10.0.4:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"7E2DC70C-42FF-493D-AA17-4BE1EA475839\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realplayer:10.0.5:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"71ACF9F5-6779-41FD-9F96-4DD202035DEA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realplayer:10.0.6:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"F29F875A-883C-4C8D-BF8D-4A1D83286A2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"348F3214-E5C2-4D39-916F-1B0263D13F40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1040:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91278EFD-0285-4389-9C53-50FE225C3C19\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1053:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"336246FA-A06F-4792-9923-E6948F3494FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1056:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06C7BF07-8B9A-4BDF-BEA9-C55ABDEA8165\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1059:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEC15988-96A0-4EBE-BF99-14D46F5A9553\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1069:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41F65BDA-393F-4274-B193-B578255DB013\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1235:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D4CADDC-84D2-45D9-99BA-A662D7490154\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:rhapsody:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC2B8F89-AFE2-4029-A9D3-88C99EC4774C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:rhapsody:3.0_build_0.815:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BDA20ED-8151-44EC-AAFC-A273E918AE29\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Heap-based buffer overflow in the embedded player in multiple RealNetworks products and versions including RealPlayer 10.x, RealOne Player, and Helix Player allows remote malicious servers to cause a denial of service (crash) and possibly execute arbitrary code via a chunked Transfer-Encoding HTTP response in which either (1) the chunk header length is specified as -1, (2) the chunk header with a length that is less than the actual amount of sent data, or (3) a missing chunk header.\"}]",
"id": "CVE-2005-2922",
"lastModified": "2024-11-21T00:00:43.623",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": true, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2005-12-31T05:00:00.000",
"references": "[{\"url\": \"http://secunia.com/advisories/19358\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/19365\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1015808\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/172489\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.novell.com/linux/security/advisories/2006_18_realplayer.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2005-762.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2005-788.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/17202\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.service.real.com/realplayer/security/03162006_player/en/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2006/1057\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/25409\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11444\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/19358\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/19365\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1015808\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/172489\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.novell.com/linux/security/advisories/2006_18_realplayer.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2005-762.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2005-788.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/17202\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.service.real.com/realplayer/security/03162006_player/en/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2006/1057\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/25409\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11444\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2005-2922\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-12-31T05:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Heap-based buffer overflow in the embedded player in multiple RealNetworks products and versions including RealPlayer 10.x, RealOne Player, and Helix Player allows remote malicious servers to cause a denial of service (crash) and possibly execute arbitrary code via a chunked Transfer-Encoding HTTP response in which either (1) the chunk header length is specified as -1, (2) the chunk header with a length that is less than the actual amount of sent data, or (3) a missing chunk header.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:helix_player:10.0:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"E971D8BF-C1B8-4489-9824-D7F1ACBA8DFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:helix_player:10.0.1:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"42C40382-8A43-47BC-B112-1FF87D513F8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:helix_player:10.0.2:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"41015020-77F1-4604-8F90-1D3398ABF96A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:helix_player:10.0.3:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"8F09FC85-710E-4B98-BB7B-D388F3EB58DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:helix_player:10.0.4:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"0CCEE460-284C-408D-A4FB-A49622004E84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:helix_player:10.0.5:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"82258764-D89B-482B-BB7E-31D86BD6C586\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:helix_player:10.0.6:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"7621E796-2AF1-447B-B350-74841A85855E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realone_player:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5695A49-561F-434E-92AE-AEF13162BD78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realone_player:0.288:*:mac_os_x:*:*:*:*:*\",\"matchCriteriaId\":\"FA36B216-65D0-490C-8102-7D99D21417CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realone_player:0.297:*:mac_os_x:*:*:*:*:*\",\"matchCriteriaId\":\"CD6C057A-407C-4794-9250-80E07C8E09CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E940DAB-0CD5-4EC0-916F-6C0B2AE26D19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF6535A6-6647-4E60-B5AA-24DFC06360AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realplayer:*:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"19BC5A59-BCBD-4859-8329-B4974D43DB90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realplayer:8.0:*:win32:*:*:*:*:*\",\"matchCriteriaId\":\"003D7E29-9970-4984-9756-C070E15B7979\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD49D16C-B0AC-4228-9984-010661596232\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realplayer:10.0.0.305:*:mac_os:*:*:*:*:*\",\"matchCriteriaId\":\"3ADE53B2-53D5-4E84-9CFF-9D7C12727115\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realplayer:10.0.0.331:*:mac_os:*:*:*:*:*\",\"matchCriteriaId\":\"EB4B64DF-7D14-460C-AE2D-02C67575CC9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realplayer:10.0.1:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"382E5B10-AE07-4325-BEE7-7B0432CDF845\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realplayer:10.0.2:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"96897C76-EB4F-49A7-997E-C735CDD2B83A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realplayer:10.0.3:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"10A106E1-78FE-4CA3-9B3B-956B88E758E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realplayer:10.0.4:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"7E2DC70C-42FF-493D-AA17-4BE1EA475839\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realplayer:10.0.5:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"71ACF9F5-6779-41FD-9F96-4DD202035DEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realplayer:10.0.6:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"F29F875A-883C-4C8D-BF8D-4A1D83286A2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"348F3214-E5C2-4D39-916F-1B0263D13F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1040:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91278EFD-0285-4389-9C53-50FE225C3C19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1053:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"336246FA-A06F-4792-9923-E6948F3494FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1056:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06C7BF07-8B9A-4BDF-BEA9-C55ABDEA8165\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1059:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEC15988-96A0-4EBE-BF99-14D46F5A9553\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1069:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41F65BDA-393F-4274-B193-B578255DB013\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1235:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D4CADDC-84D2-45D9-99BA-A662D7490154\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:rhapsody:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC2B8F89-AFE2-4029-A9D3-88C99EC4774C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:rhapsody:3.0_build_0.815:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BDA20ED-8151-44EC-AAFC-A273E918AE29\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/19358\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19365\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1015808\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/172489\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_18_realplayer.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-762.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-788.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/17202\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.service.real.com/realplayer/security/03162006_player/en/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/1057\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/25409\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11444\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/19358\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/19365\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1015808\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/172489\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_18_realplayer.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-762.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-788.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/17202\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.service.real.com/realplayer/security/03162006_player/en/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/1057\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/25409\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11444\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…