what you don't know can hurt you

Realplayer Watchfolders Long Filepath Overflow

Realplayer Watchfolders Long Filepath Overflow
Posted Oct 26, 2012
Authored by Joseph Sheridan | Site reactionpenetrationtesting.co.uk

Realplayer version is vulnerable to a stack buffer overflow vulnerability in the 'Watch Folders' facility.

tags | advisory, overflow
advisories | CVE-2012-4987
MD5 | f54a766630fec37edb9ac3cfe7a96c85

Realplayer Watchfolders Long Filepath Overflow

Change Mirror Download
Realplayer Watchfolders Long Filepath Overflow by Joseph Sheridan


Realplayer version is vulnerable to a stack buffer overflow vulnerability in the 'Watch Folders' facility.

CVE number: CVE-2012-4987
Impact: High
Vendor homepage: http://www.real.com
Vendor notified: 10/09/2012
Vendor response: The vendor initially responded to say that a representative would be in touch regarding the bug but no contact was made and no reply was made to several further emails.
Credit: Joseph Sheridan of ReactionIS

Affected Products

Realplayer version, other versions may also be affected.


A default Realplayer install has a 'Watch Folders' function which scans a (configurable) list of folders including Downloads and My Documents etc. If there is an overly long directory path (i.e. > 256 characters) then a null byte on the stack is overwritten and a buffer overflow subsequently occurs. As the following event log details show, it is possible to take full control of EIP:

Faulting application name: RealPlay.exe, version:,
time stamp: 0x4fe37037
Faulting module name: unknown, version:, time stamp: 0x00000000
Exception code: 0xc0000005
Fault offset: 0x61616161
Faulting process id: 0x157c
Faulting application start time: 0x01cd7c9f57dcb90d

The payload could be delivered by enticing a victim to extract a malicious zip file containing a random file with an overly long directory structure containing the exploit code.


An attacker may be able to take full control of the host and execute arbitrary code.


No known solution at this time.

About ReactionIS

Reaction Information Security is a leading independent pen test consultancy specialising in delivering the highest quality security testing services including network pen testing and web application security testing. As a CESG CHECK Service Provider we are authorised to carry out penetration testing on classified government networks.


RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    15 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    6 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By