CVE-2009-4248
Summary
| CVE | CVE-2009-4248 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2010-01-25 19:30:01 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | Buffer overflow in the RTSPProtocol::HandleSetParameterRequest function in client/core/rtspprotocol.cpp in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted RTSP SET_PARAMETER request. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:N/AC:M/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Microsoft | Windows | All | All | All | All |
| Application | Realnetworks | Realplayer | 10.0 | All | All | All |
| Application | Realnetworks | Realplayer | 10.5 | All | All | All |
| Application | Realnetworks | Realplayer | 11.0 | All | All | All |
| Application | Realnetworks | Realplayer | 11.0.1 | All | All | All |
| Application | Realnetworks | Realplayer | 11.0.2 | All | All | All |
| Application | Realnetworks | Realplayer | 11.0.3 | All | All | All |
| Application | Realnetworks | Realplayer | 11.0.4 | All | All | All |
| Application | Realnetworks | Realplayer | 11.0.5 | All | All | All |
| Application | Realnetworks | Realplayer Enterprise | All | All | All | All |
| Application | Realnetworks | Realplayer Sp | 1.0.0 | All | All | All |
| Application | Realnetworks | Realplayer Sp | 1.0.1 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 404 Not Found | af854a3a-2127-422b-91ae-364da2661108 | helixcommunity.org | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Patch, Vendor Advisory |
| [Client-cvs] core rtspprotocol.cpp,1.55.2.18,1.55.2.19 | af854a3a-2127-422b-91ae-364da2661108 | lists.helixcommunity.org | |
| [Client-cvs] core rtspprotocol.cpp,1.85,1.86 | af854a3a-2127-422b-91ae-364da2661108 | lists.helixcommunity.org | |
| Red Hat update for HelixPlayer - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| RealPlayer and StarSearch by Real Official Homepage — Real.com | af854a3a-2127-422b-91ae-364da2661108 | service.real.com | Patch, Vendor Advisory |
| Multiple RealNetworks Products Multiple Remote Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| SecurityTracker.com Archives - RealPlayer Buffer Overflows Let Remote Users Execute Arbitrary Code | af854a3a-2127-422b-91ae-364da2661108 | securitytracker.com | Patch |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| [Client-dev] CR: fix for bug 211210 | af854a3a-2127-422b-91ae-364da2661108 | lists.helixcommunity.org | |
| 404 Not Found | af854a3a-2127-422b-91ae-364da2661108 | helixcommunity.org | |
| RealPlayer Multiple Vulnerabilities - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Bug 561361 – CVE-2009-4248 HelixPlayer / RealPlayer: RTSP SET_PARAMETER buffer overflow | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.redhat.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.