[VulnWatch] [EEYEB-20050510] - RealPlayer Data Packet Stack Overflow

Advisories_at_eeye.com
Date: 11/10/05

  • Next message: Advisories_at_eeye.com: "[VulnWatch] [EEYEB-20050701] - RealPlayer Zipped Skin File Buffer Overflow II"
    Date: Thu, 10 Nov 2005 13:41:46 -0800
    To: <bugtraq@securityfocus.com>, <vulnwatch@vulnwatch.org>, <ntbugtraq@ntbugtraq.com>, <full-disclosure@lists.grok.org.uk>
    
    

    RealPlayer Data Packet Stack Overflow

    Release Date:
    November 10, 2005

    Date Reported:
    May 28, 2005

    Severity:
    High (Remote Code Execution)

    Vendor:
    RealNetworks

    Systems Affected:
    Windows:
    RealPlayer 10.5 (6.0.12.1040-1235)
    RealPlayer 10
    RealOne Player v2
    RealOne Player v1
    RealPlayer 8
    RealPlayer Enterprise
     
    Mac:
    RealPlayer 10
     
    Linux:
    RealPlayer 10 (10.0.0 - 5)
    Helix Player (10.0.0 - 5)

    Overview:
    eEye Digital Security has discovered a critical vulnerability in
    RealPlayer. The vulnerability allows a remote attacker to reliably
    overwrite stack memory with arbitrary data and execute arbitrary code in
    the context of the user who executed the player.

    This specific flaw exists in the first data packet contained in a Real
    Media file. By specially crafting a malformed .rm movie file, a direct
    stack overwrite is triggered, and reliable code execution is then
    possible.

    Technical Details:
    The vulnerability is triggered by setting the application specific
    length field of the [data packet + 1] to 0x80 - 0xFF this will cause a
    stack overflow.
    The value is sign-extended and passed as the length to memcpy.

    Protection:
    Retina Network Security Scanner has been updated to identify this
    vulnerability.
    Blink End Point Protection proactively protects against this
    vulnerability

    Vendor Status:
    RealNetworks has released a patch for this vulnerability. The patch is
    available via the "Check for Update" menu item under Tools on the
    RealPlayer menu bar or from
    http://service.real.com/realplayer/security/.

    Credit:
    Karl Lynn

    Related Links:
    This advisory has been assigned the following ID numbers;

    EEYEB-20050510
    OSVDB ID: 18822
    CVE ID: CAN-2005-2629

    Greetings:
    Brett Moore, Mark Dowd, Paul Gese @ RealNetworks, Mike Schiffman, AJREZ,
    Luke, Derek "TEX" Soeder, Andre Audits, "The Claw", and Dug Song.

    Copyright (c) 1998-2005 eEye Digital Security
    Permission is hereby granted for the redistribution of this alert
    electronically. It is not to be edited in any way without express
    consent of eEye. If you wish to reprint the whole or any part of this
    alert in any other medium excluding electronic medium, please email
    alert@eEye.com for permission.

    Disclaimer
    The information within this paper may change without notice. Use of this
    information constitutes acceptance for use in an AS IS condition. There
    are no warranties, implied or express, with regard to this information.
    In no event shall the author be liable for any direct or indirect
    damages whatsoever arising out of or in connection with the use or
    spread of this information. Any use of this information is at the user's
    own risk.


  • Next message: Advisories_at_eeye.com: "[VulnWatch] [EEYEB-20050701] - RealPlayer Zipped Skin File Buffer Overflow II"

    Relevant Pages