[webcast-l] [Fwd: RealNetworks Security Update 4/07/04]
Bill Best
bill at commedia.org.uk
Thu Apr 8 01:02:09 BST 2004
-------- Original Message --------
Subject: RealNetworks Security Update 4/07/04
Date: Wed, 7 Apr 2004 10:23:46 -0700 (PDT)
From: RealNetworks Sales
This email has been sent to you as a part of RealNetworks' continuing
effort to inform you of security issues that may put you at risk. While
we have not received any reports of anyone being attacked through the
exploits we detail below, all security vulnerabilities are taken very
seriously by RealNetworks Inc.
Player security vulnerability
RealNetworks Inc. has recently been made aware of a security
vulnerability that could potentially allow an attacker to run arbitrary
code on a user's machine.
The specific exploit was:
To fashion an R3T media file to create a "Buffer Overrun" error.
Real has found and fixed the problem.
Affected Software:
The following software is only vulnerable if users have taken a past
action to download the specialized R3T plug-in. This exploit affects
RealPlayer 8, RealOne Player, RealOne Player v2 for Windows only (all
languages), RealPlayer 10 Beta (English only) and ReaPlayer Enterprise
(all versions, standalone and as configured by the ReaPlayer Enterprise
Manager).
RealPlayer 10 Gold is not vulnerable as the affected component, if
present, is removed during installation.
Workaround:
To ensure that your Player is protected, we recommend installing the
update available which will remove the vulnerable plug-in.
All consumer players can be protected by reinstalling the player with
RealPlayer10. See http://service.real.com/help/faq/security/ for more
information.
RealPlayer Enterprise Manager and RealOne Desktop Manager can do any of
the following to remedy the vulnerability (NOTE: You only need to secure
your clients if they have installed the R3T (Real 3D text) plug-in).
* Create a new player without the R3T plugin
* Upgrade to RealPlayer Enterprise Manager
* Download the Free Enterprise player from
http://www.realnetworks.com/products/free_trial.html
* Manually remove the R3T plugin (Call tech support for instructions)
Server Security Vulnerability
The specific exploit is:
Helix Universal Server/Proxy 9 contains a potential root exploit when
certain types of HTTP POST messages are sent to the server's
Administration System port. Helix Mobile Server and Gateway 10 is
vulnerable to a similar type of attack. By utilizing this exploit, an
attacker could potentially gain inappropriate access to the system on
which the server/proxy is running. Note that RealNetworks knows of no
systems which have been compromised due to this vulnerability.
Note also that this vulnerability requires administrator login access to
the server/proxy Administration system. If administrator access is
properly controlled, the risk of the vulnerability is negligible.
Impacted Products and Versions:
* Helix Universal Mobile Server & Gateway 10, versions 10.1.1.120 and
prior
* Helix Universal Server & Gateway 9, version 9.0.2.881 and prior
RealSystem Server and Proxy versions 8.x and earlier are not impacted
by this vulnerability.
SOLUTION:
Download the adminsf plugin or a new server build at:
http://service.real.com/help/faq/security/security022604.html
Best Regards,
RealNetworks Essential Support Services team.
More information about the webcast-l
mailing list