RHEL 4 : HelixPlayer (RHSA-2007:0605)

High Nessus Plugin ID 25624


The remote Red Hat host is missing a security update.


An updated HelixPlayer package that fixes a buffer overflow flaw is now available.

This update has been rated as having critical security impact by the Red Hat Security Response Team.

HelixPlayer is a media player.

A buffer overflow flaw was found in the way HelixPlayer processed Synchronized Multimedia Integration Language (SMIL) files. It was possible for a malformed SMIL file to execute arbitrary code with the permissions of the user running HelixPlayer. (CVE-2007-3410)

All users of HelixPlayer are advised to upgrade to this updated package, which contains a backported patch and is not vulnerable to this issue.


Update the affected HelixPlayer package.

See Also



Plugin Details

Severity: High

ID: 25624

File Name: redhat-RHSA-2007-0605.nasl

Version: $Revision: 1.29 $

Type: local

Agent: unix

Published: 2007/06/29

Modified: 2016/12/29

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:HelixPlayer, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:4.5

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2007/06/27

Vulnerability Publication Date: 2007/06/26

Exploitable With

CANVAS (D2ExploitPack)

Reference Information

CVE: CVE-2007-3410

OSVDB: 37374, 38342

RHSA: 2007:0605

CWE: 119