{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"RealPlayer 10 sur Microsoft Windows ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"RealOne Player sur MacOs ;","product":{"name":"macOS","vendor":{"name":"Apple","scada":false}}},{"description":"RealPlayer 10 (10.0.5 - 10.0.8) sur Linux ;","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Realplayer 10.1 (10.0.0.305 - 10.0.0.331, 10.0.0.352, 10.0.0.396 - 10.0.0.412, 10.0.0.481) sur MacOS ;","product":{"name":"macOS","vendor":{"name":"Apple","scada":false}}},{"description":"RealPlayer Enterprise sur Microsoft Windows ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"RealOne Player v1 sur Microsoft Windows ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"RealPlayer 10.5 (6.0.12.1040 - 6.0.12.1578, 6.0.12.1698, 6.0.12.1741) sur Microsoft Windows ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"RealPlayer 8 sur Microsoft Windows ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"RealOne Player v2 sur Microsoft Windows ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Helix Player (10.0.5 - 10.0.8) sur Linux.","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nCinq vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le lecteur multim\u00e9dia\nRealPlayer. Elles sont dues \u00e0 des d\u00e9bordements de m\u00e9moire qu'une\npersonne malintentionn\u00e9e distante peut exploiter en incitant\nl'utilisateur \u00e0 ouvrir un fichier au format mp3, rm, SMIL, swf, ram ou\npls sp\u00e9cialement construit.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2007-5081","url":"https://www.cve.org/CVERecord?id=CVE-2007-5081"},{"name":"CVE-2007-4599","url":"https://www.cve.org/CVERecord?id=CVE-2007-4599"},{"name":"CVE-2007-2263","url":"https://www.cve.org/CVERecord?id=CVE-2007-2263"},{"name":"CVE-2007-5080","url":"https://www.cve.org/CVERecord?id=CVE-2007-5080"},{"name":"CVE-2007-2264","url":"https://www.cve.org/CVERecord?id=CVE-2007-2264"},{"name":"CVE-2007-3410","url":"https://www.cve.org/CVERecord?id=CVE-2007-3410"}],"links":[],"reference":"CERTA-2007-AVI-457","revisions":[{"description":"version initiale.","revision_date":"2007-10-26T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s permettant \u00e0 une personne malintentionn\u00e9e\nd'ex\u00e9cuter du code arbitraire \u00e0 distance ont \u00e9t\u00e9 identifi\u00e9es dans\nRealPlayer.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans RealPlayer","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 de RealNetworks du 25 octobre 2007","url":"http://service.real.com/main.html"}]}
