RealNetworks Information for VU#329561

RealNetworks Helix Universal Server vulnerable to buffer overflow when supplied an overly long string within the "Transport" field of a SETUP RTSP request

Status

Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References

None

Addendum

RealNetworks has provided information about patches for the Helix Universal Server at the following location:

http://www.service.real.com/help/faq/security/bufferoverrun12192002.html

Users are encouraged to review this information and apply the patch.

If you have feedback, comments, or additional information about this vulnerability, please send us email.