ソフト名:RealPlayer 14.0.1以下, RealPlayer Enterprise 2.1.4以下
回避策:アップデートにて対応
脆弱性:システムアクセス, リモートコード実行
ソース:http://europe.real.com/realplayer
http://www.realnetworks.com/products-services/realplayer-enterprise.aspx
http://service.real.com/realplayer/security/02082011_player/en/
http://docs.real.com/docs/security/SecurityUpdate020811RPE.pdf
http://www.zerodayinitiative.com/advisories/ZDI-11-076/
http://secunia.com/advisories/43268/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0694
CVE:CVE-2011-0694
危険性:High Risk
ラベル Real RealPlayer Enterprise の投稿を表示しています。 すべての投稿を表示
ラベル Real RealPlayer Enterprise の投稿を表示しています。 すべての投稿を表示
2011-02-11
2010-10-20
Real RealPlayer, Real RealPlayer Enterprise, Real RealPlayer SP
ソフト名:Real RealPlayer 11.0~11.1, Real RealPlayer 2.1.2 Enterprise, Real RealPlayer SP 1.0.0~1.1.4
回避策:アップデートにて対応
脆弱性:リモートコード実行, ヒープオーバーフロー, スタックオーバーフロー
ソース:http://service.real.com/realplayer/security/10152010_player/en/
http://www.zerodayinitiative.com/advisories/ZDI-10-209/
http://www.zerodayinitiative.com/advisories/ZDI-10-210/
http://www.zerodayinitiative.com/advisories/ZDI-10-211/
http://www.zerodayinitiative.com/advisories/ZDI-10-212/
http://www.zerodayinitiative.com/advisories/ZDI-10-213/
http://www.securityfocus.com/bid/44144
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2578
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2998
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3747
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3748
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3749
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3750
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3751
http://secunia.com/advisories/41096
http://secunia.com/advisories/41743
http://www.vupen.com/english/advisories/2010/2698
CVE:CVE-2010-2578, CVE-2010-2998, CVE-2010-3747, CVE-2010-3748, CVE-2010-3749, CVE-2010-3750, CVE-2010-3751
危険性:High Risk
回避策:アップデートにて対応
脆弱性:リモートコード実行, ヒープオーバーフロー, スタックオーバーフロー
ソース:http://service.real.com/realplayer/security/10152010_player/en/
http://www.zerodayinitiative.com/advisories/ZDI-10-209/
http://www.zerodayinitiative.com/advisories/ZDI-10-210/
http://www.zerodayinitiative.com/advisories/ZDI-10-211/
http://www.zerodayinitiative.com/advisories/ZDI-10-212/
http://www.zerodayinitiative.com/advisories/ZDI-10-213/
http://www.securityfocus.com/bid/44144
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2578
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2998
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3747
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3748
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3749
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3750
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3751
http://secunia.com/advisories/41096
http://secunia.com/advisories/41743
http://www.vupen.com/english/advisories/2010/2698
CVE:CVE-2010-2578, CVE-2010-2998, CVE-2010-3747, CVE-2010-3748, CVE-2010-3749, CVE-2010-3750, CVE-2010-3751
危険性:High Risk
登録:
投稿 (Atom)