Gentoo Linux Security Advisory 201312-11 - A buffer overflow vulnerability in Win32 Codecs can potentially allow for user-assisted arbitrary code execution. Versions less than or equal to 20071007-r4 are affected.
39d68b1d52bbae02397cedbe33f971f088260eb69863e2f325351c8e2d1a4351
Gentoo Linux Security Advisory GLSA 200809-03 - Dyon Balding of Secunia Research reported an unspecified heap-based buffer overflow in the Shockwave Flash (SWF) frame handling. Versions less than 11.0.0.4028-r1 are affected.
a65d4052f0656b72303e36e5bc16d7194e4a524bbd4cdc389f12c5248564cdd5
Secunia Research has discovered a vulnerability in RealPlayer, which can potentially be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a design error within the handling of frames in Shockwave Flash (SWF) files and can be exploited to cause a heap-based buffer overflow. Successful exploitation may allow execution of arbitrary code. Affected is RealNetworks RealPlayer version 10.5 Build 6.0.12.1483.
85ea60ee6a68e6f33d5b4bdcc122dc5e0957dc9bfc2c3b7f6a8a25295470e2c8