Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2011-5243 | Real Networks Netzip Classic version 7.5.1.86 is vulnerable to a stack-based buffer overflow when parsing a specially crafted ZIP archive. The vulnerability is triggered when the application attempts to process a file name within the archive that exceeds the expected buffer size. Exploitation allows arbitrary code execution under the context of the victim user when the ZIP file is opened. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 14 Aug 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 Aug 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Real Networks Netzip Classic version 7.5.1.86 is vulnerable to a stack-based buffer overflow when parsing a specially crafted ZIP archive. The vulnerability is triggered when the application attempts to process a file name within the archive that exceeds the expected buffer size. Exploitation allows arbitrary code execution under the context of the victim user when the ZIP file is opened. | |
| Title | Real Networks Netzip Classic 7.5.1.86 File Parsing Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-08-14T14:52:18.163Z
Reserved: 2025-08-13T17:33:27.652Z
Link: CVE-2011-10016
Updated: 2025-08-14T13:46:12.238Z
Status : Awaiting Analysis
Published: 2025-08-13T21:15:29.067
Modified: 2025-08-14T13:11:53.633
Link: CVE-2011-10016
No data.
OpenCVE Enrichment
No data.
EUVD