Lucene search

K
saintSAINT CorporationSAINT:F139377CFA4FD0DA72C85AD8185F9BFC
HistoryJan 07, 2013 - 12:00 a.m.

RealPlayer InternetShortcut URL property buffer overflow

2013-01-0700:00:00
SAINT Corporation
my.saintcorporation.com
34

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.817 High

EPSS

Percentile

98.4%

Added: 01/07/2013
CVE: CVE-2012-5691
BID: 56956
OSVDB: 88486

Background

RealPlayer is a media player application which can play back various multimedia file formats.

Problem

A buffer overflow vulnerability in the **GetPrivateProfileString** function allows command execution when a user opens a RealMedia file containing a specially crafted URL property in the InternetShortcut section.

Resolution

Upgrade to RealPlayer 16.0.0.282 or higher.

References

<http://service.real.com/realplayer/security/12142012_player/en/&gt;

Limitations

Exploit works on RealPlayer 15.0.6.14 on Windows XP SP3 English (DEP OptIn) and requires a user to download the exploit file and drag it into RealPlayer.

Platforms

Windows

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.817 High

EPSS

Percentile

98.4%