CVE-2011-10016 – RealNetworks Netzip Classic Stack-Based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the
CVE-2011-10016 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Aug. 13, 2025

    Action Type Old Value New Value
    Added Tag unsupported-when-assigned
    Added Description Real Networks Netzip Classic version 7.5.1.86 is vulnerable to a stack-based buffer overflow when parsing a specially crafted ZIP archive. The vulnerability is triggered when the application attempts to process a file name within the archive that exceeds the expected buffer size. Exploitation allows arbitrary code execution under the context of the victim user when the ZIP file is opened.
    Added CVSS V4.0 AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-121
    Added Reference https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/real_networks_netzip_bof.rb
    Added Reference https://www.exploit-db.com/exploits/16083
    Added Reference https://www.exploit-db.com/exploits/17985
    Added Reference https://www.softpedia.com/get/Compression-tools/NetZip-Classic.shtml
    Added Reference https://www.vulncheck.com/advisories/real-networks-netzip-classic-file-parsing-buffer-overflow
Share the Post:

Related Posts