Lucene search

K
zdiLuigi AuriemmaZDI-12-051
HistoryMar 22, 2012 - 12:00 a.m.

RealNetworks RealPlayer RTSP SETUP Request Remote Code Execution Vulnerability

2012-03-2200:00:00
Luigi Auriemma
www.zerodayinitiative.com
6

0.014 Low

EPSS

Percentile

86.2%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Real Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists due to the application mishandling an error that occurs when parsing an RTSP SETUP request. When an error occurs, the application will free a pointer to a linked list due to the stream being closed. Following this, the application will then attempt to access the freed element whilst traversing the list. This can lead to a use-after-free condition and can lead to code execution under the context of the application.

0.014 Low

EPSS

Percentile

86.2%