Unrated severityNVD Advisory· Published Oct 31, 2007· Updated Apr 23, 2026
CVE-2007-2264
CVE-2007-2264
Description
Heap-based buffer overflow in RealNetworks RealPlayer 8, 10, 10.1, and possibly 10.5; RealOne Player 1 and 2; and RealPlayer Enterprise allows remote attackers to execute arbitrary code via a RAM (.ra or .ram) file with a large size value in the RA header.
Affected products
21cpe:2.3:a:realnetworks:realone_player:1.0:*:windows:en:*:*:*:*+ 2 more
- cpe:2.3:a:realnetworks:realone_player:1.0:*:windows:en:*:*:*:*
- cpe:2.3:a:realnetworks:realone_player:2.0:*:windows:*:*:*:*:*
- cpe:2.3:a:realnetworks:realone_player:*:*:mac:en:*:*:*:*
cpe:2.3:a:realnetworks:realplayer:10.0:10.0.0.305:mac:*:*:*:*:*+ 16 more
- cpe:2.3:a:realnetworks:realplayer:10.0:10.0.0.305:mac:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0:10.0.0.331:mac:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0:10.0.0.352:mac:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0:10.0.5:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0:10.0.6:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0:10.0.7:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0:10.0.8:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0:10.0.9:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0:*:windows:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.1:10.0.0.396:mac:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.1:10.0.0.412:mac:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.1:10.0.0._481:mac:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.5:6.0.12.1040:windows:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.5:6.0.12.1578:windows:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.5:6.0.12.1698:windows:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.5:6.0.12.1741:windows:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_enterprise:*:*:windows:en:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- secunia.com/advisories/27361nvdPatchVendor Advisory
- securitytracker.com/idnvdPatch
- www.securityfocus.com/bid/26214nvdPatch
- www.vupen.com/english/advisories/2007/3628nvdVendor Advisory
- service.real.com/realplayer/security/10252007_player/en/nvd
- www.attrition.org/pipermail/vim/2007-October/001841.htmlnvd
- www.securityfocus.com/archive/1/483113/100/0/threadednvd
- www.zerodayinitiative.com/advisories/ZDI-07-063.htmlnvd
- exchange.xforce.ibmcloud.com/vulnerabilities/37437nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9100nvd
News mentions
0No linked articles in our index yet.