Real Networks Netzip Classic version 7.5.1.86 is vulnerable to a stack-based buffer overflow when parsing a specially crafted ZIP archive. The vulnerability is triggered when the application attempts to process a file name within the archive that exceeds the expected buffer size. Exploitation allows arbitrary code execution under the context of the victim user when the ZIP file is opened.
History

Thu, 14 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 Aug 2025 21:00:00 +0000

Type Values Removed Values Added
Description Real Networks Netzip Classic version 7.5.1.86 is vulnerable to a stack-based buffer overflow when parsing a specially crafted ZIP archive. The vulnerability is triggered when the application attempts to process a file name within the archive that exceeds the expected buffer size. Exploitation allows arbitrary code execution under the context of the victim user when the ZIP file is opened.
Title Real Networks Netzip Classic 7.5.1.86 File Parsing Buffer Overflow
Weaknesses CWE-121
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-08-13T20:52:29.328Z

Updated: 2025-08-14T14:52:18.163Z

Reserved: 2025-08-13T17:33:27.652Z

Link: CVE-2011-10016

cve-icon Vulnrichment

Updated: 2025-08-14T13:46:12.238Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-13T21:15:29.067

Modified: 2025-08-14T13:11:53.633

Link: CVE-2011-10016

cve-icon Redhat

No data.