what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

realra.txt

realra.txt
Posted Jun 14, 2004
Authored by John Heasman | Site nextgenss.com

NGSSoftware Insight Security Research Advisory #NISR11062004 - By crafting a malformed .RA, .RM, .RV or .RMJ file it possible to cause heap corruption that can lead to execution of arbitrary code. By forcing a browser or enticing a user to a website containing such a file, arbitrary attacker supplied code could be executed on the target machine. This code will run in the security context of the logged on user. Another attacker vector is via an e-mail attachment. NGSResearchers have created reliable exploits to take advantage of these issues. Versions affected are: RealOne Player (English), RealOne Player v2 (all languages), RealPlayer 10 (English, German and Japanese), RealPlayer 8 (all languages), RealPlayer Enterprise (all versions, standalone and as-configured by the RealPlayer Enterprise Manager).

tags | advisory, arbitrary
SHA-256 | 9386d33a1646cab5f7eba3a0866f4a1fc55d21938426f75fe5d480922d5d3f5b

realra.txt

Change Mirror Download

NGSSoftware Insight Security Research Advisory

Name: REAL One Player code execution through malformed media file
Systems Affected: RealOne Player (English), RealOne Player v2 (all
languages),
RealPlayer 10 (English, German and Japanese), RealPlayer 8 (all languages),
RealPlayer Enterprise (all versions, standalone and "as configured" by the
RealPlayer Enterprise Manager)
Severity: High
Vendor URL: http://www.real.com
Author: John Heasman [ john at ngssoftware.com ]
Date of Public Advisory: 11th June 2004
Advisory number: #NISR11062004
Advisory URL: http://www.nextgenss.com/advisories/realra.txt


Description
***********

RealOne and RealPlayer are the most widely used products for internet media
delivery. There are currently in excess of 200 million users that use these
products worldwide.

Details
*******

By crafting a malformed .RA, .RM, .RV or .RMJ file it possible to cause heap
corruption that can lead to execution of arbitrary code. By forcing a
browser or enticing a user to a website containing such a file, arbitrary
attacker supplied code could be executed on the target machine. This code
will run in the security context of the logged on user. Another attacker
vector is via an e-mail attachment. NGSResearchers have created reliable
exploits to take advantage of these issues. Due to the ease of exploitation
these vulnerabilities should be considered as high risk and customers are
urged to update their players as soon as is possible.

Fix Information
***************

For the various fix options available for different types of REAL products,
NGS suggest visiting
http://service.real.com/help/faq/security/040610_player/EN/ for detailed
information.


About NGSSoftware
*****************

NGSSoftware design, research and develop intelligent, advanced application
security assessment scanners. Based in the United Kingdom, NGSSoftware have
offices in the South of London and the East Coast of Scotland. NGSSoftware's
sister company NGSConsulting, offers best of breed security consulting
services, specializing in application, host and network security
assessments.

http://www.ngssoftware.com/

Telephone +44 208 401 0070
Fax +44 208 401 0076

enquiries@ngssoftware.com





Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close