High Risk Flaw in RealPlayer

From: NGSSoftware Insight Security Research (nisr_at_nextgenss.com)
Date: 11/11/05

  • Next message: A.1.M_at_Hotmail.com: "SQL injection in phpWebThing 1.4.4"
    To: <bugtraq@securityfocus.com>, <ntbugtraq@listserv.ntbugtraq.com>
    Date: Fri, 11 Nov 2005 16:44:42 -0000
    
    

    John Heasman of NGSSoftware has discovered a high risk vulnerability in
    RealPlayer.
    Versions affected include:

    RealPlayer 10.5 (6.0.12.1040-1235)
    RealPlayer 10

    (Note: RealOne Player v1 & v2, RealPlayer 8 and RealPlayer Enterprise have
    also been updated to resolve issues reported by other security researchers)

    The flaw permits execution of arbitrary code via a malformed image contained
    within a skin file. The update can be downloaded from

    http://service.real.com/help/faq/security/051110_player/EN/

    NGSSoftware are going to withhold details of this flaw for three months.
    Full details will be published on the 11th of January 2006. This three month
    window will allow users of RealPlayer the time needed to apply the patch
    before the details are released to the general public. This reflects
    NGSSoftware's approach to responsible disclosure.

    NGSSoftware Insight Security Research
    http://www.nextgenss.com/
    +44(0)208 401 0070


  • Next message: A.1.M_at_Hotmail.com: "SQL injection in phpWebThing 1.4.4"

    Relevant Pages