[webcast-l] RealPlayer vulnerabilities
Bill Best
bill at commedia.org.uk
Fri Feb 6 10:39:01 GMT 2004
http://www.service.real.com/help/faq/security/040123_player/EN/
Description:
Multiple vulnerabilities have been discovered in RealOne Player and
RealPlayer, where the most serious potentially can be exploited by
malicious people to compromise a vulnerable system.
Boundary errors when parsing ".RP", ".RT", ".RAM", ".RPM", and ".SMIL"
files can be exploited to cause buffer overflows via specially crafted
files (e.g. hosted on a malicious web site). Successful exploitation
allows execution of arbitrary code on a user's system.
An unspecified error in the handling of ".RMP" files can be exploited to
download and execute arbitrary code on a user's system.
An input validation error in the handling of ".SMIL" and other files can
be exploited to conduct cross-site scripting attacks.
The following products are affected:
* RealPlayer 8
* RealPlayer 10 Beta
* RealOne Player
* RealOne Player v2
* RealOne Enterprise Desktop / RealPlayer Enterprise (all language
versions, all platforms)
More information about the webcast-l
mailing list