RealNetworks RealPlayer fails to properly handle frames within Shockwave Flash (SWF) files, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
The RealNetworks RealPlayer application provides support for the SWF file format. A buffer overflow exists in the way that the RealPlayer handles specially crafted SWF files. A remote, unauthenticated attacker with the ability to supply a specially crafted SWF file could exploit this vulnerability to execute arbitrary code on an affected system.
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user.
Apply an update
This issue is addressed in RealPlayer 11.0.3. Please see the RealPlayer security update for more details.
RealNetworks, Inc. Affected
Updated: July 28, 2008
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Refer to the RealPlayer security update for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
This issue was reported in the RealPlayer security update for version 11.0.3. RealNetworks credits Dyon Balding of Secunia for reporting this issue.
This document was written by Chris Taschner.
|Date First Published:||2008-07-28|
|Date Last Updated:||2008-07-28 20:15 UTC|