Real Media Player filename handler stack buffer overflow vulnerability

ID VU:246524
Type cert
Reporter CERT
Modified 2013-08-26T13:38:00



Real Media Player fails to parse filenames correctly, which may allow a remote, unauthenticated attacker to execute arbitrary code in the context of the logged in user.


CWE-121: Stack-based Buffer Overflow - CVE-2013-4973

Real Media Player versions prior to version are vulnerable to a stack buffer overflow when provided with a specially crafted .rmp file. When executed, it may allow a remote unauthenticated attacker to run arbitrary code in the context of the logged in user.


A remote unauthenticated attacker may obtain sensitive information, cause a denial of service condition, or execute arbitrary code with the privileges of the application..


Apply an Update
RealNetworks has provided an update to this application, RealPlayer Users are advised to apply the update.

Vendor Information


Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

RealNetworks, Inc. __ Affected

Notified: February 07, 2013 Updated: August 26, 2013



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

A patched version of the application is available from the link below.

Vendor References

  • <>
  • <>

CVSS Metrics

Group | Score | Vector
Base | 3.7 | AV:L/AC:H/Au:N/C:P/I:P/A:P
Temporal | 2.9 | E:POC/RL:OF/RC:C
Environmental | 0.9 | CDP:L/TD:L/CR:ND/IR:ND/AR:ND


  • <>
  • <>


Thanks to hamburgers maccoy for reporting this vulnerability.

This document was written by Chris King.

Other Information

CVE IDs: | CVE-2013-4973
Date Public: | 2013-08-23
Date First Published: | 2013-08-26
Date Last Updated: | 2013-08-26 13:38 UTC
Document Revision: | 24