Overview
A buffer overflow in RealNetworks media players could allow a remote attacker to execute arbitrary code on an affected system.
Description
The RealNetworks RealPlayer and Helix Player applications allow users to view local and remote audio and video content. These players support multiple media formats including the synchronized multimedia integration language (SMIL). A stack-based buffer overflow exists in the way that these players handle the "wallclock-sync" values encoded in the SMIL data. A remote attacker with the ability to supply a specially crafted media file or stream could exploit this vulnerability to execute arbitrary code on an affected system. Note that we are aware of publicly-available exploit code for this vulnerability. |
Impact
A remote unauthenticated attacker could execute arbitrary code with the privileges of the user running a vulnerable application or cause the vulnerable application to crash, resulting in a denial of service. |
Solution
Apply an update from the vendor
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported by iDefense Labs in iDefense Labs Public Advisory: 06.26.07. iDefense credits an anonymous researcher with reporting this vulnerability to them.
This document was written by Chad R Dougherty.
Other Information
CVE IDs: | CVE-2007-3410 |
Severity Metric: | 22.28 |
Date Public: | 2007-06-26 |
Date First Published: | 2007-06-28 |
Date Last Updated: | 2007-06-28 15:22 UTC |
Document Revision: | 7 |