RealNetworks Information for VU#934932

RealNetworks media server RTSP protocol parser buffer overflow

Status

Affected

Vendor Statement

Please see the vendor statement for VU#934932 at:

http://www.service.real.com/help/faq/security/rootexploit082203.html

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References

None

Addendum

Text of statement for VU#934932 follows:
[updated Wednesday, August 27, 2003]

Server Exploit Vulnerability

Updated August 22, 2003

Helix Universal Server 9 and earlier versions (RealSystem Server 8, 7 and RealServer G2) are vulnerable to a root exploit when certain types of character strings appear in large numbers within URLs destined for the Server's protocol parsers. RealNetworks Proxy products are not vulnerable to this exploit.

Solution:

      RealNetworks has verified that vulnerability to this exploit can be effectively closed by removing the RealNetworks View Source plug-in from the /Plugins directory and restarting the Server process.
        • UNIX/Linux: vsrcplin.so.9.0 (Helix Universal Server), vsrcplin.so.6.0 (RealSystem Server 8 & 7, and RealServer G2).
        • Windows: vsrc3260.dll
      The View Source Plug-in is responsible for reading and displaying file format headers of media files accessible to the file systems loaded by the Server. Removal of this plug-in will not hinder on-demand or live streaming delivery or logging and authentication services of the product. With the plug-in removed however, the Content Browsing feature will be disabled.

      RealNetworks considers the removal of the View Source Plug-in a work-around for this issue, we will be making a new version of the Helix Universal Server available to all current customers that resolves this problem and does not require system administrators to remove any shipping components post installation. Once the new version is available, RealNetworks will urge customer to upgrade.

      We want to thank those who posted information about this problem on http://www.securityfocus.org/.

Warranty:
      While RealNetworks endeavors to provide you with the highest quality products and services, we cannot guarantee and do not warrant that the operation of any RealNetworks product will be error-free, uninterrupted or secure. See your original license agreement for details of our limited warranty or warranty disclaimer.

       



Legal Notice and Terms of Use

If you have feedback, comments, or additional information about this vulnerability, please send us email.