Vulnerability Note VU#514734

Multiple Real media players fail to properly validate RMP files

Original Release date: 06 Feb 2004 | Last revised: 06 Feb 2004

Overview

Multiple Real media players fail to properly validate RealJukebox Metadata Package (RMP) files which may permit an attacker to download and execute arbitrary code on the user's system.

Description

RealNetworks Real media players are multimedia applications that allow users to view local and remote audio/video content. These players support multiple media types including RealJukebox Metadata Package (RMP) files. There is a vulnerability in the way Real players validate RMP files. This flaw could be used by an attacker to download and execute arbitrary code on the user's system by creating a specially crafted RMP file.

According to RealNetworks Security Advisory, this vulnerability affects the following products:

  • RealOne Player
  • RealOne Player v2 (all language versions, all platforms)
  • RealOne Enterprise Desktop or RealPlayer Enterprise (all versions, standalone and as configured by the RealOne Desktop Manager or RealPlayer Enterprise Manager)

Impact

An attacker could download and execute arbitrary code on a user's system.

Solution


Upgrade

For instructions on upgrading, please refer to RealNetworks Security Advisory.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
RealNetworksAffected-06 Feb 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Thanks to RealNetworks and Secunia for information contained in their security advisories.

This document was written by Damon Morda.

Other Information

  • CVE IDs: Unknown
  • Date Public: 05 Feb 2004
  • Date First Published: 06 Feb 2004
  • Date Last Updated: 06 Feb 2004
  • Severity Metric: 11.07
  • Document Revision: 24

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.