Vulnerability Note VU#298651
RealNetworks RealPlayer Shockwave Flash (SWF) file vulnerability
RealNetworks RealPlayer fails to properly handle frames within Shockwave Flash (SWF) files, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
The RealNetworks RealPlayer application provides support for the SWF file format. A buffer overflow exists in the way that the RealPlayer handles specially crafted SWF files. A remote, unauthenticated attacker with the ability to supply a specially crafted SWF file could exploit this vulnerability to execute arbitrary code on an affected system.
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user.
Apply an update
This issue is addressed in RealPlayer 11.0.3. Please see the RealPlayer security update for more details.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|RealNetworks, Inc.||Affected||-||28 Jul 2008|
CVSS Metrics (Learn More)
This issue was reported in the RealPlayer security update for version 11.0.3. RealNetworks credits Dyon Balding of Secunia for reporting this issue.
This document was written by Chris Taschner.
- CVE IDs: CVE-2007-5400
- Date Public: 25 Jul 2008
- Date First Published: 28 Jul 2008
- Date Last Updated: 28 Jul 2008
- Severity Metric: 11.48
- Document Revision: 6
If you have feedback, comments, or additional information about this vulnerability, please send us email.