Vulnerability Note VU#298651

RealNetworks RealPlayer Shockwave Flash (SWF) file vulnerability

Original Release date: 28 Jul 2008 | Last revised: 28 Jul 2008


RealNetworks RealPlayer fails to properly handle frames within Shockwave Flash (SWF) files, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.


The RealNetworks RealPlayer application provides support for the SWF file format. A buffer overflow exists in the way that the RealPlayer handles specially crafted SWF files. A remote, unauthenticated attacker with the ability to supply a specially crafted SWF file could exploit this vulnerability to execute arbitrary code on an affected system.


By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user.


Apply an update

This issue is addressed in RealPlayer 11.0.3. Please see the RealPlayer security update for more details.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
RealNetworks, Inc.Affected-28 Jul 2008
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This issue was reported in the RealPlayer security update for version 11.0.3. RealNetworks credits Dyon Balding of Secunia for reporting this issue.

This document was written by Chris Taschner.

Other Information

  • CVE IDs: CVE-2007-5400
  • Date Public: 25 Jul 2008
  • Date First Published: 28 Jul 2008
  • Date Last Updated: 28 Jul 2008
  • Severity Metric: 11.48
  • Document Revision: 6


If you have feedback, comments, or additional information about this vulnerability, please send us email.