[NT] REAL One Player Code Execution Through Malformed Media File

From: SecuriTeam (support_at_securiteam.com)
Date: 06/14/04

  • Next message: SecuriTeam: "[NT] Real Networks RealPlayer URL Parsing Buffer Overflow Vulnerability"
    To: list@securiteam.com
    Date: 14 Jun 2004 11:23:07 +0200

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    The SecuriTeam alerts list - Free, Accurate, Independent.

    Get your security news from a reliable source.

    - - - - - - - - -

      REAL One Player Code Execution Through Malformed Media File


    RealOne and RealPlayer are "the most widely used products for internet
    media delivery. There are currently in excess of 200 million users that
    use these products worldwide". By crafting a malformed .RA, .RM, .RV or
    RMJ file it possible to cause heap corruption that can lead to execution
    of arbitrary code.


    Vulnerable Systems:
     * RealOne Player (English)
     * RealOne Player v2 (all languages),
     * RealPlayer 10 (English, German and Japanese)
     * RealPlayer 8 (all languages)
     * RealPlayer Enterprise (all versions, standalone and "as configured" by
    the RealPlayer Enterprise Manager)

    By forcing a browser or enticing a user to a website containing such a
    file, arbitrary attacker supplied code could be executed on the target
    machine. This code will run in the security context of the logged on user.
    Another attacker vector is via an e-mail attachment. NGSResearchers have
    created reliable exploits to take advantage of these issues. Due to the
    ease of exploitation these vulnerabilities should be considered as high
    risk and customers are urged to update their players as soon as is

    Fix Information:
    For the various fix options available for different types of REAL
    products, NGS suggest visiting
    http://service.real.com/help/faq/security/040610_player/EN/ for detailed


    The information has been provided by <mailto:nisr@nextgenss.com>
    NGSSoftware Insight Security Research.
    The original article can be found at:


    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com


    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

  • Next message: SecuriTeam: "[NT] Real Networks RealPlayer URL Parsing Buffer Overflow Vulnerability"