A buffer overflow vulnerability exists in the RealSystem Proxy. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable host. An exploit exists for this vulnerability and is publicly available.
RealSystem Proxy is a streaming media proxy-cache. RealNetworks describes RealSystem Proxy as follows:
RealSystemยฎ Proxy 8 is a dedicated streaming media proxy-cache that enables ISPs and enterprises to manage digital media content entering their networks.
A buffer overflow vulnerability exists in the RealSystem Proxy, versions 8.x. For more information, please see RealSystem Server and Proxy Buffer Overflow Vulnerability.
A remote attacker may be able to execute arbitrary code with the privileges of the RealSystem Proxy process.
Update your software.
912219
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: May 01, 2003
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see <http://service.real.com/help/faq/security/bufferoverflow.html>.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23912219 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was discovered by Tim Austwick of the QinetiQ Security Health Check Team.
This document was written by Ian A Finlay.
CVE IDs: | None |
---|---|
Severity Metric: | 33.75 Date Public: |