Overview
Multiple Real media players vulnerable to buffer overflow when parsing certain media files which may permit an attacker to execute arbitrary code on the user's system.
Description
RealNetworks Real media players are multimedia applications that allow users to view local and remote audio/video content. These players support multiple media types including RealPix (RP), RealText (RT), Real Audio (RAM), RealAudio Plugin (RPM), and synchronized multimedia integration language (SMIL) files. There is a vulnerability in the way Real players validate these media files. This flaw could be used to execute arbitrary code on the user's system by creating a specially crafted media file. According to RealNetworks Security Advisory, this vulnerability affects the following products:
|
Impact
An attacker could execute arbitrary code on a user's system. |
Solution
Upgrade |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to RealNetworks, Secunia, and NGSSoftware for information contained in their security advisories.
This document was written by Damon Morda.
Other Information
CVE IDs: | None |
Severity Metric: | 11.07 |
Date Public: | 2004-02-05 |
Date First Published: | 2004-02-06 |
Date Last Updated: | 2004-02-06 17:45 UTC |
Document Revision: | 19 |