RealOne Player / Real .WAV Heap Overflow File Format Vulnerability

From: Mark Litchfield (mark_at_ngssoftware.com)
Date: 03/02/05

  • Next message: Xin Ouyang: "Foxmail server "USER" command Multiple remote buffer overflow"
    To: <bugtraq@securityfocus.com>
    Date: Wed, 2 Mar 2005 11:34:38 -0000
    
    

    Mark Litchfield of NGSSoftware has discovered a high risk Heap Overflow
    vulnerability in the .WAV file format when being opened by either of the
    following products:

    Windows:

    RealPlayer 10.5 (6.0.12.1056 and below)
    RealPlayer 10
    RealOne Player V2
    RealOne Player V1
    RealPlayer 8
    RealPlayer Enterprise

    Linux:
    RealPlayer 10 (10.0.0.2 and below)
    Helix Player

    This issue has been resolved in the latest version as detailed at :

    http://service.real.com/realplayer/security/

    It can be downloaded from:

    http://service.real.com/help/faq/security/050224_player

    Or alternatively select Tools / Check For Update from within the media
    player.

    NGSSoftware are going to withhold details of this flaw for three months.
    Full details
    will be published on the 1st of June 2005. This three month window will
    allow users of
    the above Real products the time needed to apply the patch before the
    details are released to the general
    public. This reflects NGSSoftware's approach to responsible disclosure.

    NGSSoftware Insight Security Research
    http://www.ngssoftware.com
    http://www.databasesecurity.com/
    +44(0)208 401 0070


  • Next message: Xin Ouyang: "Foxmail server "USER" command Multiple remote buffer overflow"

    Relevant Pages