Unrated severityNVD Advisory· Published Jan 25, 2010· Updated Apr 29, 2026
CVE-2009-4245
CVE-2009-4245
Description
Heap-based buffer overflow in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a compressed GIF file, related to gifcodec.cpp and gifimage.cpp.
Affected products
18cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*+ 11 more
- cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.1:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:11.0.0:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:11.0.1:*:linux:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:helix_player:10.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:realnetworks:helix_player:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_player:11.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_player:11.0.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
15- securitytracker.com/idnvdPatch
- service.real.com/realplayer/security/01192010_player/en/nvdPatchVendor Advisory
- www.vupen.com/english/advisories/2010/0178nvdPatchVendor Advisory
- secunia.com/advisories/38218nvdVendor Advisory
- lists.helixcommunity.org/pipermail/datatype-cvs/2008-July/008455.htmlnvd
- osvdb.org/61969nvd
- secunia.com/advisories/38450nvd
- www.redhat.com/support/errata/RHSA-2010-0094.htmlnvd
- www.securityfocus.com/bid/37880nvd
- bugzilla.redhat.com/show_bug.cginvd
- exchange.xforce.ibmcloud.com/vulnerabilities/55800nvd
- helixcommunity.org/viewcvs/datatype/image/gif/common/gifcodec.cppnvd
- helixcommunity.org/viewcvs/datatype/image/gif/common/gifimage.cppnvd
- helixcommunity.org/viewcvs/datatype/image/gif/common/pub/gifcodec.hnvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9998nvd
News mentions
0No linked articles in our index yet.