RealPlayer sotto Attacco

ERCOLINO

Membro dello Staff
Amministratore
Registrato
3 Marzo 2003
Messaggi
252.670
Località
Torino
Nel week-end RealNetworks ha distribuito ai propri utenti una patch urgente per le versioni Windows di RealPlayer 10.5 e 11 Beta: il fix sistema una vulnerabilità già sfruttata da alcuni siti per installare sui computer delle vittime trojan e altro genere di malware.


Dettagli
 
RealPlayer Playlist Handling Buffer Overflow Vulnerability


Secunia Advisory: SA27248
Release Date: 2007-10-22

Critical: Extremely critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch

Software: RealOne Player 1.x
RealOne Player 2.x
RealPlayer 10.x

CVE reference: CVE-2007-5601 (Secunia mirror)

Want to know the next time vulnerabilities are fixed in this product?
- Companies can be alerted via email and SMS!


Description:
A vulnerability has been discovered in RealPlayer, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a signedness error in MPAMedia.dll when handling playlist names. This can be exploited to cause a stack-based buffer overflow by e.g. importing a file into a specified playlist with an overly long name via the "Import()" method of the IERPCtl ActiveX control (ierpplug.dll).

Successful exploitation allows execution of arbitrary code.

NOTE: The vulnerability is currently being actively exploited.

Solution:
Apply patch for RealPlayer 10.5 and 11 beta:

http://service.real.com/realplayer/security/191007_player/en/securitydb.rnx


Bollettino di Sicurezza
 
Indietro
Alto Basso