CVE-2008-5911 (GCVE-0-2008-5911)
Vulnerability from cvelistv5 – Published: 2009-01-20 15:26 – Updated: 2024-08-07 11:13
VLAI?
Summary
Multiple buffer overflows in RealNetworks Helix Server and Helix Mobile Server 11.x before 11.1.8 and 12.x before 12.0.1 allow remote attackers to (1) cause a denial of service via three crafted RTSP SETUP commands, or execute arbitrary code via (2) an NTLM authentication request with malformed base64-encoded data, (3) an RTSP DESCRIBE command, or (4) a DataConvertBuffer request.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T11:13:13.174Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1021500",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1021500"
},
{
"name": "1021498",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1021498"
},
{
"name": "33360",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/33360"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://docs.real.com/docs/security/SecurityUpdate121508HS.pdf"
},
{
"name": "ADV-2008-3521",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/3521"
},
{
"name": "1021501",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1021501"
},
{
"name": "1021499",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1021499"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-12-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in RealNetworks Helix Server and Helix Mobile Server 11.x before 11.1.8 and 12.x before 12.0.1 allow remote attackers to (1) cause a denial of service via three crafted RTSP SETUP commands, or execute arbitrary code via (2) an NTLM authentication request with malformed base64-encoded data, (3) an RTSP DESCRIBE command, or (4) a DataConvertBuffer request."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-02-26T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "1021500",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1021500"
},
{
"name": "1021498",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1021498"
},
{
"name": "33360",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/33360"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://docs.real.com/docs/security/SecurityUpdate121508HS.pdf"
},
{
"name": "ADV-2008-3521",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/3521"
},
{
"name": "1021501",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1021501"
},
{
"name": "1021499",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1021499"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-5911",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple buffer overflows in RealNetworks Helix Server and Helix Mobile Server 11.x before 11.1.8 and 12.x before 12.0.1 allow remote attackers to (1) cause a denial of service via three crafted RTSP SETUP commands, or execute arbitrary code via (2) an NTLM authentication request with malformed base64-encoded data, (3) an RTSP DESCRIBE command, or (4) a DataConvertBuffer request."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1021500",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021500"
},
{
"name": "1021498",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021498"
},
{
"name": "33360",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33360"
},
{
"name": "http://docs.real.com/docs/security/SecurityUpdate121508HS.pdf",
"refsource": "CONFIRM",
"url": "http://docs.real.com/docs/security/SecurityUpdate121508HS.pdf"
},
{
"name": "ADV-2008-3521",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3521"
},
{
"name": "1021501",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021501"
},
{
"name": "1021499",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021499"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-5911",
"datePublished": "2009-01-20T15:26:00",
"dateReserved": "2009-01-20T00:00:00",
"dateUpdated": "2024-08-07T11:13:13.174Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:helix_server:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A30A2490-21FC-4C0D-80A3-B89E6F58E93A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:helix_server:12.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0890EDD4-63FF-43EC-9EC4-852B34E00F51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:helix_server_mobile:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74F01F2C-036C-4B6E-B66D-F0870801D397\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:realnetworks:helix_server_mobile:12.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CB773CC-C81C-424A-9493-4CAD2E0E8262\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple buffer overflows in RealNetworks Helix Server and Helix Mobile Server 11.x before 11.1.8 and 12.x before 12.0.1 allow remote attackers to (1) cause a denial of service via three crafted RTSP SETUP commands, or execute arbitrary code via (2) an NTLM authentication request with malformed base64-encoded data, (3) an RTSP DESCRIBE command, or (4) a DataConvertBuffer request.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples desbordamientos de b\\u00fafer en RealNetworks Helix Server y Helix Mobile Server v11.x anteriores a v11.1.8 y v12.x anteriores a v12.0.1 permite a atacantes remotos (1) provocar una denegaci\\u00f3n de servicio a trav\\u00e9s de tres comandos manipulados RTSP SETUP, o ejecutar c\\u00f3digo de su elecci\\u00f3n a trav\\u00e9s de (2) una petici\\u00f3n de autenticaci\\u00f3n NTLM con datos malformados codificados en base64, (3) un comando RTSP DESCRIBE, o (4) una petici\\u00f3n DataConvertBuffer.\"}]",
"evaluatorImpact": "Per: http://docs.real.com/docs/security/SecurityUpdate121508HS.pdf\r\n\r\nImpacted Products and Versions:\r\nHelix Server Version 11.x\r\nHelix Server Version 12.x\r\nHelix Mobile Server Version 11.x\r\nHelix Mobile Server Version 12.x",
"evaluatorSolution": "Per: http://docs.real.com/docs/security/SecurityUpdate121508HS.pdf\r\n\r\nThe Fix:\r\nVersion 11.1.8 and Version 12.0.1 of the Helix Server and the Helix Mobile Server have been updated to ensure that the above\r\nvulnerabilities have been resolved.\r\n\r\nSOLUTION:\r\nThe vulnerability is resolved on the following platforms by installing Version 11.1.8 or Version 12.0.1 of the Helix Server and the Helix\r\nMobile Server. This only pertains to supported versions of the platforms listed below. The updated version will be available on your\r\nRealNetworks PAM site after 11:59 p.m. PST, on December 15, 2008.",
"id": "CVE-2008-5911",
"lastModified": "2024-11-21T00:55:11.460",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2009-01-20T16:00:00.203",
"references": "[{\"url\": \"http://docs.real.com/docs/security/SecurityUpdate121508HS.pdf\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/33360\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id?1021498\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1021499\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1021500\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1021501\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/3521\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://docs.real.com/docs/security/SecurityUpdate121508HS.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/33360\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id?1021498\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1021499\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1021500\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1021501\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/3521\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2008-5911\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-01-20T16:00:00.203\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple buffer overflows in RealNetworks Helix Server and Helix Mobile Server 11.x before 11.1.8 and 12.x before 12.0.1 allow remote attackers to (1) cause a denial of service via three crafted RTSP SETUP commands, or execute arbitrary code via (2) an NTLM authentication request with malformed base64-encoded data, (3) an RTSP DESCRIBE command, or (4) a DataConvertBuffer request.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples desbordamientos de b\u00fafer en RealNetworks Helix Server y Helix Mobile Server v11.x anteriores a v11.1.8 y v12.x anteriores a v12.0.1 permite a atacantes remotos (1) provocar una denegaci\u00f3n de servicio a trav\u00e9s de tres comandos manipulados RTSP SETUP, o ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de (2) una petici\u00f3n de autenticaci\u00f3n NTLM con datos malformados codificados en base64, (3) un comando RTSP DESCRIBE, o (4) una petici\u00f3n DataConvertBuffer.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:helix_server:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A30A2490-21FC-4C0D-80A3-B89E6F58E93A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:helix_server:12.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0890EDD4-63FF-43EC-9EC4-852B34E00F51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:helix_server_mobile:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74F01F2C-036C-4B6E-B66D-F0870801D397\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realnetworks:helix_server_mobile:12.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CB773CC-C81C-424A-9493-4CAD2E0E8262\"}]}]}],\"references\":[{\"url\":\"http://docs.real.com/docs/security/SecurityUpdate121508HS.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/33360\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id?1021498\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1021499\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1021500\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1021501\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/3521\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://docs.real.com/docs/security/SecurityUpdate121508HS.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/33360\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id?1021498\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1021499\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1021500\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1021501\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/3521\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorSolution\":\"Per: http://docs.real.com/docs/security/SecurityUpdate121508HS.pdf\\r\\n\\r\\nThe Fix:\\r\\nVersion 11.1.8 and Version 12.0.1 of the Helix Server and the Helix Mobile Server have been updated to ensure that the above\\r\\nvulnerabilities have been resolved.\\r\\n\\r\\nSOLUTION:\\r\\nThe vulnerability is resolved on the following platforms by installing Version 11.1.8 or Version 12.0.1 of the Helix Server and the Helix\\r\\nMobile Server. This only pertains to supported versions of the platforms listed below. The updated version will be available on your\\r\\nRealNetworks PAM site after 11:59 p.m. PST, on December 15, 2008.\",\"evaluatorImpact\":\"Per: http://docs.real.com/docs/security/SecurityUpdate121508HS.pdf\\r\\n\\r\\nImpacted Products and Versions:\\r\\nHelix Server Version 11.x\\r\\nHelix Server Version 12.x\\r\\nHelix Mobile Server Version 11.x\\r\\nHelix Mobile Server Version 12.x\"}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…