SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Multimedia)  >   RealOne (RealPlayer) Vendors:   RealNetworks
RealPlayer Bugs Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1026643
SecurityTracker URL:  http://securitytracker.com/id/1026643
CVE Reference:   CVE-2012-0922, CVE-2012-0923, CVE-2012-0924, CVE-2012-0925, CVE-2012-0926, CVE-2012-0927, CVE-2012-0928   (Links to External Site)
Date:  Feb 7 2012
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 15.0.1.13 and prior versions; 12.0.0.1701 for Mac
Description:   Multiple vulnerabilities were reported in RealPlayer. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

Specially crafted rvrender RMFF flags can trigger code execution [CVE-2012-0922]. Luigi Auriemma reported this vulnerability.

Specially crafted RV20 frame size array data can trigger code execution [CVE-2012-0923]. Luigi Auriemma reported this vulnerability.

Specially crafted VIDOBJ_START_CODE data can trigger code execution [CVE-2012-0924]. Luigi Auriemma reported this vulnerability.

Specially crafted RV40 data can trigger code execution [CVE-2012-0925]. Dan Rosenberg of Virtual Security Research and Damian Put reported this vulnerability.

Specially crafted RV10 data can trigger code execution [CVE-2012-0926]. Dan Rosenberg of Virtual Security Research and Damian Put reported this vulnerability.

Specially crafted RealAudio coded_frame_size values can trigger code execution [CVE-2012-0927]. Windows RealPlayer 15.0 is affected. Luigi Auriemma reported this vulnerability.

Specially crafted Atrac data can trigger code execution [CVE-2012-0928]. Andrzej Dyjak reported this vulnerability. Windows RealPlayer 14.0.7 and prior versions are affected. Mac RealPlayer 12.0.0.1701 and prior versions are also affected.

Impact:   A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued a fix (15.02.71; 12.0.0.1703 for Mac).

The vendor's advisory is available at:

http://service.real.com/realplayer/security/02062012_player/en/

Vendor URL:  service.real.com/realplayer/security/02062012_player/en/ (Links to External Site)
Cause:   Not specified
Underlying OS:  UNIX (macOS/OS X), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC