exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Realplayer Watchfolders Long Filepath Overflow

Realplayer Watchfolders Long Filepath Overflow
Posted Oct 26, 2012
Authored by Joseph Sheridan | Site reactionpenetrationtesting.co.uk

Realplayer version 15.0.5.109 is vulnerable to a stack buffer overflow vulnerability in the 'Watch Folders' facility.

tags | advisory, overflow
advisories | CVE-2012-4987
SHA-256 | 4574d497f5b7de99ddcba37f9338d21972b688102da3b115f156e7604e82c00b

Realplayer Watchfolders Long Filepath Overflow

Change Mirror Download
Realplayer Watchfolders Long Filepath Overflow by Joseph Sheridan

Summary

Realplayer version 15.0.5.109 is vulnerable to a stack buffer overflow vulnerability in the 'Watch Folders' facility.

CVE number: CVE-2012-4987
Impact: High
Vendor homepage: http://www.real.com
Vendor notified: 10/09/2012
Vendor response: The vendor initially responded to say that a representative would be in touch regarding the bug but no contact was made and no reply was made to several further emails.
Credit: Joseph Sheridan of ReactionIS

Affected Products

Realplayer version 15.0.5.109, other versions may also be affected.

Details

A default Realplayer install has a 'Watch Folders' function which scans a (configurable) list of folders including Downloads and My Documents etc. If there is an overly long directory path (i.e. > 256 characters) then a null byte on the stack is overwritten and a buffer overflow subsequently occurs. As the following event log details show, it is possible to take full control of EIP:

Faulting application name: RealPlay.exe, version: 15.0.5.109,
time stamp: 0x4fe37037
Faulting module name: unknown, version: 0.0.0.0, time stamp: 0x00000000
Exception code: 0xc0000005
Fault offset: 0x61616161
Faulting process id: 0x157c
Faulting application start time: 0x01cd7c9f57dcb90d

The payload could be delivered by enticing a victim to extract a malicious zip file containing a random file with an overly long directory structure containing the exploit code.

Impact

An attacker may be able to take full control of the host and execute arbitrary code.

Solution

No known solution at this time.

About ReactionIS

Reaction Information Security is a leading independent pen test consultancy specialising in delivering the highest quality security testing services including network pen testing and web application security testing. As a CESG CHECK Service Provider we are authorised to carry out penetration testing on classified government networks.


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close