search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Multiple Real media players vulnerable to buffer overflow when parsing crafted media files

Vulnerability Note VU#473814

Original Release Date: 2004-02-06 | Last Revised: 2004-02-06

Overview

Multiple Real media players vulnerable to buffer overflow when parsing certain media files which may permit an attacker to execute arbitrary code on the user's system.

Description

RealNetworks Real media players are multimedia applications that allow users to view local and remote audio/video content. These players support multiple media types including RealPix (RP), RealText (RT), Real Audio (RAM), RealAudio Plugin (RPM), and synchronized multimedia integration language (SMIL) files. There is a vulnerability in the way Real players validate these media files. This flaw could be used to execute arbitrary code on the user's system by creating a specially crafted media file.

According to RealNetworks Security Advisory, this vulnerability affects the following products:

    • RealOne Player
    • RealPlayer 8

Impact

An attacker could execute arbitrary code on a user's system.

Solution

Upgrade

For instructions on upgrading, please refer to RealNetworks Security Advisory.

Vendor Information

473814
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to RealNetworks, Secunia, and NGSSoftware for information contained in their security advisories.

This document was written by Damon Morda.

Other Information

CVE IDs: None
Severity Metric: 11.07
Date Public: 2004-02-05
Date First Published: 2004-02-06
Date Last Updated: 2004-02-06 17:45 UTC
Document Revision: 19

Sponsored by CISA.