CVE-2009-4246
Summary
| CVE | CVE-2009-4246 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2010-01-25 19:30:01 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | Stack-based buffer overflow in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows user-assisted remote attackers to execute arbitrary code via a malformed .RJS skin file that contains a web.xmb file with crafted length values. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:N/AC:M/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Microsoft | Windows | All | All | All | All |
| Application | Realnetworks | Realplayer | 10.0 | All | All | All |
| Application | Realnetworks | Realplayer | 10.5 | All | All | All |
| Application | Realnetworks | Realplayer | 11.0 | All | All | All |
| Application | Realnetworks | Realplayer | 11.0.1 | All | All | All |
| Application | Realnetworks | Realplayer | 11.0.2 | All | All | All |
| Application | Realnetworks | Realplayer | 11.0.3 | All | All | All |
| Application | Realnetworks | Realplayer | 11.0.4 | All | All | All |
| Application | Realnetworks | Realplayer | 11.0.5 | All | All | All |
| Application | Realnetworks | Realplayer Enterprise | All | All | All | All |
| Application | Realnetworks | Realplayer Sp | 1.0.0 | All | All | All |
| Application | Realnetworks | Realplayer Sp | 1.0.1 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Patch, Vendor Advisory |
| Zero Day Initiative | af854a3a-2127-422b-91ae-364da2661108 | www.zerodayinitiative.com | Patch |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| RealPlayer and StarSearch by Real Official Homepage — Real.com | af854a3a-2127-422b-91ae-364da2661108 | service.real.com | Patch, Vendor Advisory |
| Multiple RealNetworks Products Multiple Remote Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| SecurityTracker.com Archives - RealPlayer Buffer Overflows Let Remote Users Execute Arbitrary Code | af854a3a-2127-422b-91ae-364da2661108 | securitytracker.com | Patch |
| RealPlayer Multiple Vulnerabilities - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.