|
|
|
|
| |
Credit:
The information has been provided by AbdulAziz Hariri.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-10-282/
|
| |
Vulnerable Systems:
* RealNetworks RealPlayer
The specific flaw exists within RealPlayer's parsing of RealPix files. If such a file contains an image tag pointing to a remote server, the player will attempt to fetch the remote file. When parsing the response from the web server, the process blindly copies the contents of the Server header into a fixed length heap buffer. If an attacker provides a large enough string, critical pointers can be overwritten allowing for arbitrary code execution under the context of the user running the player.
Patch Availability:
RealNetworks has issued an update to correct this vulnerability. More details can be found at http://service.real.com/realplayer/security/12102010_player/en/
CVE Information:
CVE-2010-4394
Disclosure Timeline:
2010-09-24 - Vulnerability reported to vendor
2010-12-10 - Coordinated public release of advisory
|
|
|
|
|