RealPlayer RAM File Processing Overflow

2005-04-20T05:11:50
ID OSVDB:15710
Type osvdb
Reporter Piotr Bania(ania.piotr@gmail.com)
Modified 2005-04-20T05:11:50

Description

Vulnerability Description

A remote overflow exists in RealPlayer. The application fails to perform proper bounds checking resulting in a buffer overflow. With a specially crafted RAM file containing an overly long hostname, a remote attacker can cause arbitrary code execution resulting in a loss of integrity.

Solution Description

Currently, there are no known workarounds or upgrades to correct this issue. However, RealNetworks has released a patch to address this vulnerability.

Short Description

A remote overflow exists in RealPlayer. The application fails to perform proper bounds checking resulting in a buffer overflow. With a specially crafted RAM file containing an overly long hostname, a remote attacker can cause arbitrary code execution resulting in a loss of integrity.

References:

Vendor URL: http://www.real.com/ Vendor Specific Advisory URL Vendor Specific Advisory URL Security Tracker: 1013768 Secunia Advisory ID:15023 Secunia Advisory ID:15033 Secunia Advisory ID:15043 Secunia Advisory ID:15028 Secunia Advisory ID:15095 RedHat RHSA: RHSA-2005:394 Other Advisory URL: http://pb.specialised.info/all/adv/real-ram-adv.txt Other Advisory URL: http://lists.suse.com/archive/suse-security-announce/2005-Apr/0008.html Other Advisory URL: http://security.gentoo.org/glsa/glsa-200504-21.xml Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2005-04/0435.html CVE-2005-0755