SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Multimedia)  >   RealOne (RealPlayer) Vendors:   RealNetworks
RealPlayer/RealOne Player Buffer Overflows in Processing .rm Files and Skin Files Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1015185
SecurityTracker URL:  http://securitytracker.com/id/1015185
CVE Reference:   CVE-2005-2629, CVE-2005-2630   (Links to External Site)
Date:  Nov 11 2005
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): RealOne v1, v2; RealPlayer 8, 10, 10.5
Description:   Several vulnerabilities were reported in RealPlayer/RealOne Player. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a RealMedia (.rm) movie file with a specially crafted first data packet to trigger a stack overflow and execute arbitrary code [CVE-2005-2629].

The vendor was notified of this vulnerability on May 28, 2005.

eEye Digital Security discovered this vulnerability.

A remote user can create a specially crafted RealPlayer skin file (.rjs) that, when processed by the target user, will trigger a heap overflow in DUNZIP32.DLL (which is included with the player) and execute arbitrary code [CVE-2005-2630].

The vendor was notified of this vulnerabiltiy on June 26, 2005.

eEye Digital Security discovered this vulnerability.

A remote user can create a specially crafted skin file that, when processed by the plyaer, will trigger a stack overflow and execute arbitrary code.

NGS Software discovered this vulnerability.

Impact:   A remote user can cause arbitrary code to be executed on the target user's system. The code will run with the privileges of the target user.
Solution:   The vendor has issued a fix, described at:

http://www.service.real.com/help/faq/security/051110_player/EN/

The vendor's advisory is available at:

http://www.service.real.com/help/faq/security/security111005.html

Vendor URL:  www.service.real.com/help/faq/security/security111005.html (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (macOS/OS X), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  [Full-disclosure] [EEYEB-20050510] - RealPlayer Data Packet Stack

RealPlayer Data Packet Stack Overflow

Release Date:
November 10, 2005

Date Reported:
May 28, 2005

Severity:
High (Remote Code Execution)

Vendor:
RealNetworks

Systems Affected:
Windows:
RealPlayer 10.5 (6.0.12.1040-1235)
RealPlayer 10
RealOne Player v2
RealOne Player v1
RealPlayer 8
RealPlayer Enterprise
 
Mac:
RealPlayer 10
 
Linux:
RealPlayer 10 (10.0.0 - 5)
Helix Player (10.0.0 - 5)

Overview:
eEye Digital Security has discovered a critical vulnerability in
RealPlayer. The vulnerability allows a remote attacker to reliably
overwrite stack memory with arbitrary data and execute arbitrary code in
the context of the user who executed the player.

This specific flaw exists in the first data packet contained in a Real
Media file. By specially crafting a malformed .rm movie file, a direct
stack overwrite is triggered, and reliable code execution is then
possible.

Technical Details:
The vulnerability is triggered by setting the application specific
length field of the [data packet + 1] to 0x80 - 0xFF this will cause a
stack overflow.
The value is sign-extended and passed as the length to memcpy.

Protection:
Retina Network Security Scanner has been updated to identify this
vulnerability.
Blink End Point Protection proactively protects against this
vulnerability

Vendor Status:
RealNetworks has released a patch for this vulnerability. The patch is
available via the "Check for Update" menu item under Tools on the
RealPlayer menu bar or from
http://service.real.com/realplayer/security/.

Credit:
Karl Lynn

Related Links:
This advisory has been assigned the following ID numbers;

EEYEB-20050510
OSVDB ID: 18822
CVE ID: CAN-2005-2629

Greetings:
Brett Moore, Mark Dowd, Paul Gese @ RealNetworks, Mike Schiffman, AJREZ,
Luke, Derek "TEX" Soeder, Andre Audits, "The Claw", and Dug Song. 

Copyright (c) 1998-2005 eEye Digital Security
Permission is hereby granted for the redistribution of this alert
electronically. It is not to be edited in any way without express
consent of eEye. If you wish to reprint the whole or any part of this
alert in any other medium excluding electronic medium, please email
alert@eEye.com for permission.

Disclaimer
The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There
are no warranties, implied or express, with regard to this information.
In no event shall the author be liable for any direct or indirect
damages whatsoever arising out of or in connection with the use or
spread of this information. Any use of this information is at the user's
own risk.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC