CVE-2011-10016
Real Networks Netzip Classic 7.5.1.86 File Parsing Buffer Overflow
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Real Networks Netzip Classic version 7.5.1.86 is vulnerable to a stack-based buffer overflow when parsing a specially crafted ZIP archive. The vulnerability is triggered when the application attempts to process a file name within the archive that exceeds the expected buffer size. Exploitation allows arbitrary code execution under the context of the victim user when the ZIP file is opened.
| CWE | CWE-121 |
| Vendor | realnetworks inc. |
| Product | netzip classic |
| Published | Aug 13, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for realnetworks inc. netzip classic
Be the first to know when new unknown vulnerabilities affecting realnetworks inc. netzip classic are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
RealNetworks Inc. / Netzip Classic
7.5.1.86
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/real_networks_netzip_bof.rb exploit-db.com: https://www.exploit-db.com/exploits/16083 exploit-db.com: https://www.exploit-db.com/exploits/17985 softpedia.com: https://www.softpedia.com/get/Compression-tools/NetZip-Classic.shtml vulncheck.com: https://www.vulncheck.com/advisories/real-networks-netzip-classic-file-parsing-buffer-overflow
Credits
C4SS!0 G0M3S