{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Realplayer 7 (pour Windows et Unix)","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"RealOne Player (pour Windows)","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Realplayer G2 (6.0.6.99 et sup\u00e9rieurs) pour Windows","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"RealOne Player Alpha pour Linux 2.2","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Realplayer Intranet 7 (pour Windows, Macintosh et Unix)","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Realplayer 8 (pour Windows et Unix)","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Realplayer Intranet 8 (pour Windows, Macintosh et Unix)","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nUn utilisateur mal intentionn\u00e9 peut effectuer un d\u00e9bordement de m\u00e9moire\ndes clients RealPlayer, en manipulant les champs en ent\u00eate d'un fichier\nRealMedia (.rm).\n\n## Solution\n\nAppliquer le correctif du client comme indiqu\u00e9 dans le bulletin de\ns\u00e9curit\u00e9 RealNetworks (Cf. Documentation).\n","cves":[],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 RealNetworks :","url":"http://www.service.real.com/help/faq/security/bufferoverrun.html"}],"reference":"CERTA-2002-AVI-020","revisions":[{"description":"version initiale.","revision_date":"2002-02-01T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire"}],"summary":"Un d\u00e9bordement de m\u00e9moire de RealPlayer permet d'ex\u00e9cuter du code\narbitraire \u00e0 distance.\n","title":"D\u00e9bordement de m\u00e9moire de RealPlayer","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 de RealPlayer","url":null}]}
