|
|
|
|
| |
Credit:
The information has been provided by Andrzej Dyjak..
The original article can be found at: http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=956
|
| |
Vulnerable Systems:
* RealPlayer 11.0 - 11.1
* RealPlayer SP 1.0 - 1.1.5
* RealPlayer 14.0.0 - 14.0.7
* Mac RealPlayer 12.0.0.1701
The vulnerability specifically exists in the way RealPlayer handles specially crafted RealMedia files using the RealVideo Renderer plugin. When decoding a specially crafted RealMedia file, RealPlayer uses a value from the file without properly validating it, which leads to heap memory corruption and an exploitable condition.
Vendor Status:
RealNetworks has released patches and workarounds to address this vulnerability.
Patch Availability:
http://service.real.com/realplayer/security/11182011_player/en/
CVE Information:
CVE-2011-4245
Disclosure Timeline:
06/15/2011 Initial Vendor Notification
06/15/2011 Initial Vendor Reply
11/18/2011 Coordinated Public Disclosure
|
|
|
|
|