|
|
|
Credit:
The information has been provided by Sebastian Apelt.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-10-281/
|
|
Vulnerable Systems:
* RealNetworks RealPlayer
The specific flaw exists within the applications support for parsing the RMX file format. When parsing the format, the application will explicitly trust 32-bits in a field used in the header for the allocation of an array. This can cause a buffer to be under-allocated and will cause a buffer overflow when initializing the array. This can lead to code execution under the context of the application.
Patch Availability:
RealNetworks has issued an update to correct this vulnerability. More details can be found at
http://service.real.com/realplayer/security/12102010_player/en/
CVE Information:
CVE-2010-4391
Disclosure Timeline:
2010-08-25 - Vulnerability reported to vendor
2010-12-10 - Coordinated public release of advisory
|
|
|
|