Bug 456855 - (CVE-2007-5400) CVE-2007-5400 RealPlayer: SWF Frame Handling Buffer Overflow
CVE-2007-5400 RealPlayer: SWF Frame Handling Buffer Overflow
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 456863 456864 456865 458689 458690 458691
  Show dependency treegraph
Reported: 2008-07-28 04:04 EDT by Tomas Hoger
Modified: 2010-12-22 17:57 EST (History)
3 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2010-12-22 17:57:58 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Tomas Hoger 2008-07-28 04:04:43 EDT
Dyon Balding of the Secunia Research discovered a security issue affecting Real
Networks' RealPlayer:

The vulnerability is caused due to a design error within the handling
of frames in Shockwave Flash (SWF) files and can be exploited to cause
a heap-based buffer overflow.


According to the upstream advisory, this issue affects Linux RealPlayer 10, and
does not affect Linux RealPlayer 11 and Helix Player 10.* and 11.*.
Comment 4 Vincent Danen 2010-12-22 17:57:58 EST
This was addressed via:

Red Hat Enterprise Linux version 3 Extras (RHSA-2008:0812)
Red Hat Enterprise Linux version 4 Extras (RHSA-2008:0812)

Note You need to log in before you can comment on or make changes to this bug.