SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Multimedia)  >   Helix Player Vendors:   helixcommunity.org
(Red Hat Issues Fix for Helix Player) RealPlayer Enterprise MP3, RAM, RealText and AVI Processing Bugs Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1014282
SecurityTracker URL:  http://securitytracker.com/id/1014282
CVE Reference:   CVE-2005-1766   (Links to External Site)
Date:  Jun 23 2005
Impact:   Execution of arbitrary code via network, Modification of system information, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Several vulnerabilities were reported in RealPlayer Enterprise. A remote user can execute arbitrary code or create files on the target user's system. HelixPlayer is affected.

A remote user can create a specially crafted MP3 or RAM file that, when loaded by the target user, will overwrite local files or invoke an ActiveX control on the target user's system.

A remote user can create a RealMedia file containing specially crafted RealText that, when loaded by the target user, will trigger a heap overflow and execute arbitrary code on the target user's system.

A remote user can create a specially crafted AVI file to trigger a buffer overflow and execute arbitrary code on the target user's system.

A remote user can create HTML that, when loaded by the target user, will create an HTML file on the target user's system and then invoke a RM file to reference the local HTML file.

The vendor credits John Heasman of NGS Software, iDEFENSE Labs, and eEye Digital Security with reporting these vulnerabilities.

Impact:   A remote user can execute arbitrary code on the target user's system with the privileges of the target user.

A remote user can create files on the target user's system.

Solution:   Red Hat has released a fix for HelixPlayer, which is affected by this vulnerability.

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/HelixPlayer-1.0.5-0.EL4.1.src.rpm
08f868c1d1b7d9674c8c757438f3bdf3 HelixPlayer-1.0.5-0.EL4.1.src.rpm

i386:
679711b03ecb529acd7eae0ed2537fb4 HelixPlayer-1.0.5-0.EL4.1.i386.rpm

ppc:
7b235efc96792aff7a96a9019763239e HelixPlayer-1.0.5-0.EL4.1.ppc.rpm

x86_64:
679711b03ecb529acd7eae0ed2537fb4 HelixPlayer-1.0.5-0.EL4.1.i386.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/HelixPlayer-1.0.5-0.EL4.1.src.rpm
08f868c1d1b7d9674c8c757438f3bdf3 HelixPlayer-1.0.5-0.EL4.1.src.rpm

i386:
679711b03ecb529acd7eae0ed2537fb4 HelixPlayer-1.0.5-0.EL4.1.i386.rpm

x86_64:
679711b03ecb529acd7eae0ed2537fb4 HelixPlayer-1.0.5-0.EL4.1.i386.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/HelixPlayer-1.0.5-0.EL4.1.src.rpm
08f868c1d1b7d9674c8c757438f3bdf3 HelixPlayer-1.0.5-0.EL4.1.src.rpm

i386:
679711b03ecb529acd7eae0ed2537fb4 HelixPlayer-1.0.5-0.EL4.1.i386.rpm

x86_64:
679711b03ecb529acd7eae0ed2537fb4 HelixPlayer-1.0.5-0.EL4.1.i386.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/HelixPlayer-1.0.5-0.EL4.1.src.rpm
08f868c1d1b7d9674c8c757438f3bdf3 HelixPlayer-1.0.5-0.EL4.1.src.rpm

i386:
679711b03ecb529acd7eae0ed2537fb4 HelixPlayer-1.0.5-0.EL4.1.i386.rpm

x86_64:
679711b03ecb529acd7eae0ed2537fb4 HelixPlayer-1.0.5-0.EL4.1.i386.rpm

Cause:   Access control error, Boundary error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  4

Message History:   This archive entry is a follow-up to the message listed below.
Jun 23 2005 RealPlayer Enterprise MP3, RAM, RealText and AVI Processing Bugs Let Remote Users Execute Arbitrary Code



 Source Message Contents

Subject:  [RHSA-2005:517-01] Critical: HelixPlayer security update


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Critical: HelixPlayer security update
Advisory ID:       RHSA-2005:517-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-517.html
Issue date:        2005-06-23
Updated on:        2005-06-23
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2005-1766
- ---------------------------------------------------------------------

1. Summary:

An updated HelixPlayer package that fixes a buffer overflow issue is now
available.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ppc, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, x86_64
Red Hat Enterprise Linux WS version 4 - i386, x86_64

3. Problem description:

HelixPlayer is a media player.

A buffer overflow bug was found in the way HelixPlayer processes SMIL files.
An attacker could create a specially crafted SMIL file, which when combined
with a malicious web server, could execute arbitrary code when opened by a
user. The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2005-1766 to this issue.

All users of HelixPlayer are advised to upgrade to this updated package,
which contains HelixPlayer version 10.0.5 and is not vulnerable to this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

159871 - CAN-2005-1766 HelixPlayer heap overflow


6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/HelixPlayer-1.0.5-0.EL4.1.src.rpm
08f868c1d1b7d9674c8c757438f3bdf3  HelixPlayer-1.0.5-0.EL4.1.src.rpm

i386:
679711b03ecb529acd7eae0ed2537fb4  HelixPlayer-1.0.5-0.EL4.1.i386.rpm

ppc:
7b235efc96792aff7a96a9019763239e  HelixPlayer-1.0.5-0.EL4.1.ppc.rpm

x86_64:
679711b03ecb529acd7eae0ed2537fb4  HelixPlayer-1.0.5-0.EL4.1.i386.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/HelixPlayer-1.0.5-0.EL4.1.src.rpm
08f868c1d1b7d9674c8c757438f3bdf3  HelixPlayer-1.0.5-0.EL4.1.src.rpm

i386:
679711b03ecb529acd7eae0ed2537fb4  HelixPlayer-1.0.5-0.EL4.1.i386.rpm

x86_64:
679711b03ecb529acd7eae0ed2537fb4  HelixPlayer-1.0.5-0.EL4.1.i386.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/HelixPlayer-1.0.5-0.EL4.1.src.rpm
08f868c1d1b7d9674c8c757438f3bdf3  HelixPlayer-1.0.5-0.EL4.1.src.rpm

i386:
679711b03ecb529acd7eae0ed2537fb4  HelixPlayer-1.0.5-0.EL4.1.i386.rpm

x86_64:
679711b03ecb529acd7eae0ed2537fb4  HelixPlayer-1.0.5-0.EL4.1.i386.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/HelixPlayer-1.0.5-0.EL4.1.src.rpm
08f868c1d1b7d9674c8c757438f3bdf3  HelixPlayer-1.0.5-0.EL4.1.src.rpm

i386:
679711b03ecb529acd7eae0ed2537fb4  HelixPlayer-1.0.5-0.EL4.1.i386.rpm

x86_64:
679711b03ecb529acd7eae0ed2537fb4  HelixPlayer-1.0.5-0.EL4.1.i386.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1766

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFCuw8VXlSAg2UNWIIRAgLYAKCOny/6nMgy2dHRpyBf09qJyQCF+gCfWM+W
2zeaekd2RJwPp4Sb+F11jjw=
=d3/R
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC