[VulnWatch] Multiple File Format Vulnerabilities (Overruns) in REALOne & RealPlayer

From: NGSoftware Insight Security Research (mark_at_ngssoftware.com)
Date: 02/04/04

  • Next message: Chris Wysopal: "[VulnWatch] Checkpoint Firewall-1 HTTP Parsing Format String Vulnerabilities"
    To: <bugtraq@securityfocus.com>, <vulnwatch@vulnwatch.org>
    Date: Wed, 4 Feb 2004 22:22:05 -0000
    
    

    NGSSoftware Insight Security Research Advisory

    Name: RealPlayer & RealOne Player Buffer Overruns
    Systems Affected: RealOne Player, RealOne Player v2, RealOne Enterprise
    Desktop / RealPlayer Enterprise (all language versions, all platforms)
    Severity: High Risk
    Vendor URL: http://www.real.com/
    Author: Mark Litchfield [ mark@ngssoftware.com ]
    Date Vendor Notified: 23rd Dec 2003
    Date of Public Advisory: 4th February 2004
    Advisory number: #NISR04022004a
    Advisory URL: http://www.ngssoftware.com/advisories/realone.txt

    Description
    ***********
    RealOne / RealPlayer is one of the most widely used products for internet
    media delivery. There are currently in excess of 200 million users worlwide
    of these products.

    Details
    *******

    By crafting malformed .RP, .RT, .RAM, .RPM & .SMIL files it is possible to
    cause heap and stack based overruns in RealPlayer / RealOne Player. By
    forcing a browser to a website containing such a file, code could be
    exectued on the target machine running in the context of the logged on user,
    alternatively the end user would be required to open the attachment (except
    in the case of the .RPM file)

    Fix Information
    ***************

    REAL have supplied a patch for this and other problems discovered by Jouko
    Pynnönen and can be downloaded from REAL's website. Detailed below is
    REAL's instruction listed in their own advisory found at
    http://service.real.com/help/faq/security/040123_player/EN/ to remediate
    these issues.

    RealOne Player, RealOne Player v2 (localized languages) and RealPlayer 10
    Beta customers please use the following steps to update your Player:

    * In the Tools menu select Check for Update.
    * Select the box next to the "RealPlayer 10" (English) or "RealOne Player"
    (localized) component.
    * Click the Install button to download and install the update.

    RealPlayer 8 (version 6.0.9.584):

    * Go to the Help menu.
    * Select "Check for Update".
    * Select the box next to the "RealPlayer 10" (English) or "RealOne Player"
    (localized) component.
    * Click the Install button to download and install the update.

    About NGSSoftware
    *****************
    NGSSoftware design, research and develop intelligent, advanced application
    security assessment scanners. Based in the United Kingdom, NGSSoftware have
    offices in the South of London and the East Coast of Scotland. NGSSoftware's
    sister company NGSConsulting, offers best of breed security consulting
    services, specialising in application, host and network security
    assessments.

    http://www.ngssoftware.com/

    Telephone +44 208 401 0070
    Fax +44 208 401 0076

    enquiries@ngssoftware.com


  • Next message: Chris Wysopal: "[VulnWatch] Checkpoint Firewall-1 HTTP Parsing Format String Vulnerabilities"

    Relevant Pages