How to Buy
This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200510-07
(RealPlayer, Helix Player: Format string vulnerability)
'c0ntex' reported that RealPlayer and Helix Player suffer from a heap
By enticing a user to play a specially crafted realpix (.rp) or
realtext (.rt) file, an attacker could execute arbitrary code with the
permissions of the user running the application.
There is no known workaround at this time.
See also :
All RealPlayer users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=media-video/realplayer-10.0.6'
Note to Helix Player users: There is currently no stable secure Helix
Player package. Affected users should remove the package until an
updated Helix Player package is released.
Risk factor :
Medium / CVSS Base Score : 5.1
Family: Gentoo Local Security Checks
Nessus Plugin ID: 19977 (gentoo_GLSA-200510-07.nasl)
CVE ID: CVE-2005-2710
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.