A buffer overflow vulnerability exists in the RealSystem Proxy. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable host. An exploit exists for this vulnerability and is publicly available.
RealSystem Proxy is a streaming media proxy-cache. RealNetworks describes RealSystem Proxy as follows:
RealSystem® Proxy 8 is a dedicated streaming media proxy-cache that enables ISPs and enterprises to manage digital media content entering their networks.
A buffer overflow vulnerability exists in the RealSystem Proxy, versions 8.x. For more information, please see RealSystem Server and Proxy Buffer Overflow Vulnerability.
A remote attacker may be able to execute arbitrary code with the privileges of the RealSystem Proxy process.
Update your software.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Vendor has issued information
__ Sort by: Status Alphabetical
Affected Unknown __ Unaffected
Updated: May 01, 2003
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Please see <http://service.real.com/help/faq/security/bufferoverflow.html>.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | | N/A
This vulnerability was discovered by Tim Austwick of the QinetiQ Security Health Check Team.
This document was written by Ian A Finlay.
CVE IDs: | None
Severity Metric:** | 33.75
Date Public: | 2003-02-19
Date First Published: | 2003-05-01
Date Last Updated: | 2003-05-01 13:20 UTC
Document Revision: | 9