{"vuid":"VU#698278","idnumber":"698278","name":"RealPlayer version 16.0.3.51 contains a buffer overflow vulnerability","keywords":["RealNetworks","RealPlayer","buffer overflow","CWE-121"],"overview":"RealPlayer version 16.0.3.51 and possibly earlier versions contain a stack-based buffer overflow vulnerability (CWE-121).","clean_desc":"CWE-121: Stack-based Buffer Overflow\nRealPlayer version 16.0.3.51 and possibly earlier versions contain a stack-based buffer overflow vulnerability. The .RMP file format is similar to standard XML encoding. An attacker can place malicious code in the value of the version or the encoding attributes inside the XML declaration to craft a malicious .RMP file. Once the file is opened by the victim, the program may crash or allow execution of code.","impact":"A remote unauthenticated attacker may be able to trick a user into opening a malicious .RMP file which may cause a denial-of-service condition or lead to arbitrary code execution.","resolution":"Apply an Update RealNetworks has advised users to apply the latest patch to remove .RMP file support to address this vulnerability.","workarounds":"","sysaffected":"","thanks":"Thanks to Gabor Seljan for reporting this vulnerability.","author":"This document was written by Adam Rauf.","public":["http://cwe.mitre.org/data/definitions/121.html","http://www.real.com/","http://service.real.com/realplayer/security/12202013_player/en/"],"cveids":["CVE-2013-7260"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2013-10-15T19:14:31Z","publicdate":"2013-12-20T00:00:00Z","datefirstpublished":"2013-12-30T13:32:10Z","dateupdated":"2014-01-10T18:11:17Z","revision":32,"vrda_d1_directreport":"1","vrda_d1_population":"1","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"6.8","cvss_basevector":"AV:N/AC:M/Au:N/C:P/I:P/A:P","cvss_temporalscore":"5.3","cvss_environmentalscore":"1.33547225100581","cvss_environmentalvector":"CDP:ND/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}