RealNetworks Information for VU#974689

RealNetworks Helix Universal Server vulnerable to buffer overflow when sent two simultaneous HTTP requests containing a long string of characters

Status

Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References

None

Addendum

Apply a patch from the vendor

RealNetworks has provided information about patches for the Helix Universal Server at the following location:

http://www.service.real.com/help/faq/security/bufferoverrun12192002.html

Users are encouraged to review this information and apply the patch.

If you have feedback, comments, or additional information about this vulnerability, please send us email.