|
|
| |
Credit:
The information has been provided by Omair.
The original article can be found at: http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=955
|
| |
Vulnerable Systems:
* RealPlayer 11.0 - 11.1
* RealPlayer SP 1.0 - 1.1.5
* RealPlayer 14.0.0 - 14.0.7
The vulnerability is due to the way RealPlayer handles specially crafted RealMedia files using the RealVideo Renderer plugin. A short value is read directly from a .ram media file. This value is used to calculate a length value which is passed to a memory copy operation as the size parameter. This can cause the memory copy operation to overflow the bounds of a fixed-sized heap buffer. This condition may lead to arbitrary code execution.
Vendor Status:
RealNetworks has released patches and workarounds to address this vulnerability.
Patch Availability:
http://service.real.com/realplayer/security/11182011_player/en/
CVE Information:
CVE-2011-4244
Disclosure Timeline:
06/15/2011 Initial Vendor Notification
06/15/2011 Initial Vendor Reply
11/18/2011 Coordinated Public Disclosure
|
|
|