SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Multimedia)  >   RealOne (RealPlayer) Vendors:   RealNetworks
RealPlayer Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1026344
SecurityTracker URL:  http://securitytracker.com/id/1026344
CVE Reference:   CVE-2011-4244, CVE-2011-4245, CVE-2011-4246, CVE-2011-4247, CVE-2011-4248, CVE-2011-4249, CVE-2011-4250, CVE-2011-4251, CVE-2011-4252, CVE-2011-4253, CVE-2011-4254, CVE-2011-4255, CVE-2011-4256, CVE-2011-4257, CVE-2011-4258, CVE-2011-4259, CVE-2011-4260, CVE-2011-4261, CVE-2011-4262   (Links to External Site)
Date:  Nov 21 2011
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Windows RealPlayer 14.0.7 and prior, Mac RealPlayer 12.0.0.1701 and prior
Description:   Multiple vulnerabilities were reported in RealPlayer. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create specially crafted content that, when loaded by the target user, will trigger a buffer overflow or memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the target user.

A heap overflow exists in the RealVideo renderer [CVE-2011-4244]. Windows-based systems are affected.

A memory corruption error exists in the RealVideo renderer [CVE-2011-4245].

A memory corruption error exists in the AAC codec [CVE-2011-4246].

A QCELP stream parsing error exists [CVE-2011-4247].

An AAC file parsing flaw exists [CVE-2011-4248]. Windows-based systems are affected.

An RV30 sample index flaw exists [CVE-2011-4249]. Windows-based systems are affected.

A parsing error exists in the ATRC codec [CVE-2011-4250].

A RealAudio sample size parsing error exists [CVE-2011-4251]. Windows-based systems are affected.

An RV10 sample height parsing flaw exists [CVE-2011-4252].

An RV20 decoding flaw exists [CVE-2011-4253].

A flaw in RTSP SETUP request processing exists [CVE-2011-4254]. Windows-based systems are affected.

An invalid codec name error exists [CVE-2011-4255].

An RV30 uninitialized index value processing flaw exists [CVE-2011-4256].

A Cook codec channel parsing flaw exists [CVE-2011-4257]. Windows-based systems are affected.

An IVR MLTI chunk length parsing flaw exists [CVE-2011-4258]. Windows-based systems are affected.

An MPG width integer underflow exists [CVE-2011-4259]. Windows-based systems are affected.

An MP4 header processing flaw exists [CVE-2011-4260]. Windows-based systems are affected.

An MP4 video dimensions heap corruption flaw exists [CVE-2011-4261]. Windows-based systems are affected.

An MP4 file parsing error exists [CVE-2011-4262]. Windows-based systems are affected.

Omair (via iDefense Labs), Andrzej Dyjak (via iDefense Labs), Damian Put (via TippingPoint's Zero Day Initiative), Luigi Auriemma (via TippingPoint's Zero Day Initiative), and Alexander Gavrun (via TippingPoint's Zero Day Initiative) reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued a fix (Windows RealPlayer 15.0.0, Mac RealPlayer 12.0.0.1703).

The vendor's advisory is available at:

http://service.real.com/realplayer/security/11182011_player/en/

Vendor URL:  service.real.com/realplayer/security/11182011_player/en/ (Links to External Site)
Cause:   Access control error, Boundary error
Underlying OS:  UNIX (macOS/OS X), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC