Patch available for multiple high risk vulnerabilities in RealPlayer

2004-10-07T00:00:00
ID SECURITYVULNS:DOC:6945
Type securityvulns
Reporter Securityvulns
Modified 2004-10-07T00:00:00

Description

John Heasman of NGSSoftware has discovered multiple high risk vulnerabilities in RealPlayer. Versions affected include

RealPlayer 10.5 (6.0.12.1040) RealPlayer 10.5 Beta (6.0.12.1016) RealPlayer 10 RealOne Player v1, v2 RealPlayer 8 RealPlayer Enterprise

The flaws, that include remotely exploitable buffer overflows and file access issues, have been fixed by Real. The patch can be downloaded from

http://service.real.com/help/faq/security/040928_player/EN/

This patch fixes NGSS BUGID 145, 146, 147 and 148 from the Vendor Notification Alerts - http://www.nextgenss.com/vna.htm

NGSSoftware are going to withhold details about these flaws for three months. Full details will be published on the 6th of January 2005. This three month window will allow users of RealPlayer the time needed to apply the patch before the details are released to the general public. This reflects NGSSoftware's new approach to responsible disclosure.

NGSSoftware Insight Security Research http://www.databasesecurity.com/ http://www.nextgenss.com/ +44(0)208 401 0070

-- NTBugtraq Editor's Note:

Want to reply to the person who sent this message? This list is configured such that just hitting reply is going to result in the message coming to the list, not to the individual who sent the message. This was done to help reduce the number of Out of Office messages posters received. So if you want to send a reply just to the poster, you'll have to copy their email address out of the message and place it in your TO: field. --