Vulnerability Note VU#473814

Multiple Real media players vulnerable to buffer overflow when parsing crafted media files

Original Release date: 06 Feb 2004 | Last revised: 06 Feb 2004


Multiple Real media players vulnerable to buffer overflow when parsing certain media files which may permit an attacker to execute arbitrary code on the user's system.


RealNetworks Real media players are multimedia applications that allow users to view local and remote audio/video content. These players support multiple media types including RealPix (RP), RealText (RT), Real Audio (RAM), RealAudio Plugin (RPM), and synchronized multimedia integration language (SMIL) files. There is a vulnerability in the way Real players validate these media files. This flaw could be used to execute arbitrary code on the user's system by creating a specially crafted media file.

According to RealNetworks Security Advisory, this vulnerability affects the following products:

  • RealOne Player
  • RealPlayer 8


An attacker could execute arbitrary code on a user's system.



For instructions on upgrading, please refer to RealNetworks Security Advisory.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
RealNetworksAffected-06 Feb 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to RealNetworks, Secunia, and NGSSoftware for information contained in their security advisories.

This document was written by Damon Morda.

Other Information

  • CVE IDs: Unknown
  • Date Public: 05 Feb 2004
  • Date First Published: 06 Feb 2004
  • Date Last Updated: 06 Feb 2004
  • Severity Metric: 11.07
  • Document Revision: 19


If you have feedback, comments, or additional information about this vulnerability, please send us email.