A buffer overflow vulnerability exists in the RealSystem Server. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable host. An exploit exists for this vulnerability and is publicly available.
RealSystem Server is a streaming media server. A buffer overflow vulnerability in RealSystem Server may allow a remote attacker to execute arbitrary code on a vulnerable host. For more information, please see RealSystem Server and Proxy Buffer Overflow Vulnerability.
A remote attacker may be able to execute arbitrary code with the privileges of the RealSystem Server process.
Update your software.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Vendor has issued information
__ Sort by: Status Alphabetical
Affected Unknown __ Unaffected
Updated: May 01, 2003
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Please see <http://www.service.real.com/help/faq/security/bufferoverflow.html>.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | | N/A
This vulnerability was discovered by Tim Austwick of the QinetiQ Security Health Check Team.
This document was written by Ian A Finlay.
CVE IDs: | None
Severity Metric:** | 25.31
Date Public: | 2003-02-19
Date First Published: | 2003-05-01
Date Last Updated: | 2003-05-01 13:47 UTC
Document Revision: | 5