Vulnerability Note VU#473814
Multiple Real media players vulnerable to buffer overflow when parsing crafted media files
Multiple Real media players vulnerable to buffer overflow when parsing certain media files which may permit an attacker to execute arbitrary code on the user's system.
RealNetworks Real media players are multimedia applications that allow users to view local and remote audio/video content. These players support multiple media types including RealPix (RP), RealText (RT), Real Audio (RAM), RealAudio Plugin (RPM), and synchronized multimedia integration language (SMIL) files. There is a vulnerability in the way Real players validate these media files. This flaw could be used to execute arbitrary code on the user's system by creating a specially crafted media file.
According to RealNetworks Security Advisory, this vulnerability affects the following products:
An attacker could execute arbitrary code on a user's system.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|RealNetworks||Affected||-||06 Feb 2004|
CVSS Metrics (Learn More)
Thanks to RealNetworks, Secunia, and NGSSoftware for information contained in their security advisories.
This document was written by Damon Morda.
- CVE IDs: Unknown
- Date Public: 05 Feb 2004
- Date First Published: 06 Feb 2004
- Date Last Updated: 06 Feb 2004
- Severity Metric: 11.07
- Document Revision: 19
If you have feedback, comments, or additional information about this vulnerability, please send us email.