ソフト名:RealPlayer 11.x/SP 1.x, RealPlayer Enterprise 2.x, Mac RealPlayer 12.x, Linux RealPlayer 11.x
回避策:アップデートにて対応
脆弱性:不正アクセス, メモリ破壊, アドレス開放エラー, バッファオーバーフロー, メモリアロケーションエラー, 整数オーバーフロー, ヒープメモリ破壊, ActiveXスクリプトのダウンロード, ActiveXスクリプトの実行, バウンダリエラー
ソース:http://jp.real.com/
http://www.realnetworks.com/products-services/realplayer-enterprise.aspx
http://secunia.com/secunia_research/2010-9/
http://secunia.com/secunia_research/2010-14/
http://secunia.com/secunia_research/2010-15/
http://service.real.com/realplayer/security/12102010_player/en/
http://realnetworksblog.com/?p=2216
http://www.zerodayinitiative.com/advisories/ZDI-10-268/
http://www.zerodayinitiative.com/advisories/ZDI-10-266/
http://www.zerodayinitiative.com/advisories/ZDI-10-270/
http://www.zerodayinitiative.com/advisories/ZDI-10-273/
http://www.zerodayinitiative.com/advisories/ZDI-10-269/
http://www.zerodayinitiative.com/advisories/ZDI-10-271/
http://www.zerodayinitiative.com/advisories/ZDI-10-272/
http://www.zerodayinitiative.com/advisories/ZDI-10-274/
http://www.zerodayinitiative.com/advisories/ZDI-10-275/
http://www.zerodayinitiative.com/advisories/ZDI-10-276/
http://www.zerodayinitiative.com/advisories/ZDI-10-277/
http://www.zerodayinitiative.com/advisories/ZDI-10-278/
http://www.zerodayinitiative.com/advisories/ZDI-10-279/
http://www.zerodayinitiative.com/advisories/ZDI-10-281/
http://www.zerodayinitiative.com/advisories/ZDI-10-280/
http://www.zerodayinitiative.com/advisories/ZDI-10-282/
http://www.zerodayinitiative.com/advisories/ZDI-10-267/
http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0216.html
http://dvlabs.tippingpoint.com/advisory/TPTI-10-18
http://dvlabs.tippingpoint.com/advisory/TPTI-10-19
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=883
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=884
http://secunia.com/advisories/38550/
http://secunia.com/advisories/42333/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0121
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0125
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2579
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2997
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2999
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4375
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4376
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4377
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4378
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4379
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4380
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4381
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4382
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4383
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4384
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4385
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4386
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4387
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4388
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4389
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4390
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4391
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4394
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4395
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4396
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4397
CVE:CVE-2010-0121, CVE-2010-0125, CVE-2010-2579, CVE-2010-2997, CVE-2010-2999, CVE-2010-4375, CVE-2010-4376, CVE-2010-4377, CVE-2010-4378, CVE-2010-4379, CVE-2010-4380, CVE-2010-4381, CVE-2010-4382, CVE-2010-4383, CVE-2010-4384, CVE-2010-4385, CVE-2010-4386, CVE-2010-4387, CVE-2010-4388, CVE-2010-4389, CVE-2010-4390, CVE-2010-4391, CVE-2010-4392, CVE-2010-4394, CVE-2010-4395, CVE-2010-4396, CVE-2010-4397
危険性:High Risk
登録:
コメントの投稿 (Atom)
0 件のコメント:
コメントを投稿