Lucene search

K
gentooGentoo FoundationGLSA-200504-21
HistoryApr 22, 2005 - 12:00 a.m.

RealPlayer, Helix Player: Buffer overflow vulnerability

2005-04-2200:00:00
Gentoo Foundation
security.gentoo.org
10

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.147 Low

EPSS

Percentile

95.7%

Background

RealPlayer is a multimedia player capable of handling multiple multimedia file formats. Helix Player is the Open Source version of RealPlayer.

Description

Piotr Bania has discovered a buffer overflow vulnerability in RealPlayer and Helix Player when processing malicious RAM files.

Impact

By enticing a user to play a specially crafted RAM file an attacker could execute arbitrary code with the permissions of the user running the application.

Workaround

There is no known workaround at this time.

Resolution

All RealPlayer users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-video/realplayer-10.0.4"

All Helix Player users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-video/helixplayer-1.0.4"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-video/realplayer< 10.0.4UNKNOWN
Gentooanyallmedia-video/helixplayer< 1.0.4UNKNOWN

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.147 Low

EPSS

Percentile

95.7%