Vulnerability Details : CVE-2010-4235
Format string vulnerability in RealNetworks Helix Server 12.x, 13.x, and 14.x before 14.2, and Helix Mobile Server 12.x, 13.x, and 14.x before 14.2, allows remote attackers to execute arbitrary code via vectors related to the x-wap-profile HTTP header.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2010-4235
Probability of exploitation activity in the next 30 days: 1.20%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 85 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-4235
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2010-4235
-
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-4235
-
http://docs.real.com/docs/security/SecurityUpdate033111HS.pdf
Vendor Advisory
-
http://www.securityfocus.com/bid/47110
RealNetworks Helix Server 'x-wap-profile' Header Remote Code Execution Vulnerability
Products affected by CVE-2010-4235
- cpe:2.3:a:realnetworks:helix_server:12.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_server:13.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_server:12.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_server:13.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_server:14.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_server:14.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_mobile_server:14.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_mobile_server:13.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_mobile_server:14.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:helix_mobile_server:12.0:*:*:*:*:*:*:*