[NEWS] RealPlayer Data Packet Stack Overflow
From: SecuriTeam (support_at_securiteam.com)
To: email@example.com Date: 14 Nov 2005 16:20:10 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
RealPlayer Data Packet Stack Overflow
Lack of proper length validation in RealPlayer's data packet handling
allows attackers to cause the program to execute arbitrary code using a
* RealPlayer version 10.5 (22.214.171.1240-1235) for Windows
* RealPlayer version 10 for Windows
* RealOne Player v2 for Windows
* RealOne Player v1 for Windows
* RealPlayer version 8 for Windows
* RealPlayer Enterprise for Windows
* RealPlayer 10 for Mac
* RealPlayer 10 (10.0.0 - 5) for Linux
* Helix Player (10.0.0 - 5) for Linux
This specific flaw exists in the first data packet contained in a Real
Media file. By specially crafting a malformed .rm movie file, a direct
stack overwrite is triggered, and reliable code execution is then
The vulnerability is triggered by setting the application specific length
field of the [data packet + 1] to 0x80 - 0xFF this will cause a stack
overflow. The value is sign-extended and passed as the length to memcpy.
The vendor has issued a patch:
The information has been provided by <mailto:Advisories@eeye.com> Eeye.
The vendor advisory can be found at:
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: firstname.lastname@example.org
In order to subscribe to the mailing list, simply forward this email to: email@example.com
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.