exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

realplayeroverrun.txt

realplayeroverrun.txt
Posted Nov 24, 2002
Authored by Mark Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR22112002 - Multiple Buffer Overruns in RealOne / RealPlayer / RealOne Enterprise. Three remotely exploitable overruns exist: two being heap based overflows and the other being a stack based overflow. On exploitation of these overruns any supplied code would execute in the security context of the logged on user.

tags | overflow
SHA-256 | 4c45143df7581f419149bb29354b7898f743178a4437690f3558d6fdc69fb9cb

realplayeroverrun.txt

Change Mirror Download
NGSSoftware Insight Security Research Advisory

Name: Multiple Buffer Overruns RealOne / RealPlayer / RealOne Enterprise
Desktop
Systems Affected: Windows All
Severity: Critical
Category: Remote Buffer Overrun
Vendor URL: http://www.real.com/
Author: Mark Litchfield (mark@ngssoftware.com)
Date: 22nd November 2002
Advisory number: #NISR22112002


Description
***********
RealOne / RealPlayer is one of the most widely used products for internet
media delivery. According to Real, there are currently around 115 million
users worlwide of these products. RealOne is the updated version of
RealPlayer. Both suffer from multiple overrun issues.

Details
*******
This advisory details three remotely exploitable overruns, two being heap
based overflows and the other being a stack based overflow. On exploitation
of these overruns any supplied code would execute in the security context of
the logged on user.

1) By following a link to a SMIL file (Synchronized Multimedia Integration
Language), RealPlayer will automatically download the file in an attempt to
play its content. By suppling an overly long paramter within the SMIL file
a heap overflow would occur in RealPlay.exe. According to Real, they have
fixed the issue by fixing the player status code to handle the cases where
there are large number of characters in the metadata of a smil file.

2) By suppling an overly long rtsp:// filename parameter, for example
within a .m3u file, when a link was followed, Real again would download the
file. When play is selected a heap overflow ocurrs in RealPlay.exe This
has apparently been fixed by Real by improving the robustness of URL
handling in this portion of the product.

3) Again, referring to number two if the 'victim' were to download the file
with a large filename (whether it was on local/rtsp or an http url) Real
Player would access violate when performing the following: If the user were
to right click in Now Playing and select "Edit Clip info" or right click in
"Now Playing" and "Select copy to my Library". In this particular instance
a stack overflow would occur in RealPlayer.


Fix Information
***************
NGSSoftware alerted Real to these problems on the 1st November 2002.
NGSSoftware highly recommend installing the patch found at
http://service.real.com/help/faq/security/bufferoverrun_player.html.
Alternatively if you Open RealPlayer - Help - About Real Player, you will
notice a Check For Updates feature. Select this.

In Real's own advisory they omit the fact that RealOne Enterprise Desktop is
also vulnerable, but only to issues 2 & 3.


Further Information
*******************
For further information about the scope and effects of buffer overflows,
please see

http://www.ngssoftware.com/papers/non-stack-bo-windows.pdf
http://www.ngssoftware.com/papers/ntbufferoverflow.html
http://www.ngssoftware.com/papers/bufferoverflowpaper.rtf
http://www.ngssoftware.com/papers/unicodebo.pdf

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close