Vulnerability Note VU#485057
RealNetworks Helix Universal Server vulnerable to buffer overflow when supplied an overly long string for the "Describe" field
Overview
The RealNetworks' Helix Universal Server supports delivery of several different media types over the Internet via RTSP (Real Time Streaming Protocol). Vulnerabilities have been discovered in the way it handles some RTSP requests. These vulnerabilities could allow a remote attacker to execute arbitrary code on vulnerable systems.
Description
Researchers at NGSSoftware have discovered a vulnerability in the way that the Helix Universal Server handles RTSP DESCRIBE requests for overly long URIs. According to the NGSSoftware advisory: By supplying a very long URL in the Describe field, again over port 554, an attacker can overwrite the saved return address allowing the execution of code. This vulnerability is similar to VU#329561 and VU#974689, which were also discovered by NGSSoftware and published in the same advisory. |
Impact
A remote attacker may be able to execute arbitrary code on the vulnerable system. This attacker-supplied code would be run with the privileges of the user running the Helix Server. |
Solution
Apply a patch from the vendor Users are encouraged to review this information and apply the patch. |
Workarounds |
Systems Affected (Learn More)
Vendor | Status | Date Notified | Date Updated |
---|---|---|---|
RealNetworks | Affected | - | 02 Apr 2003 |
CVSS Metrics (Learn More)
Group | Score | Vector |
---|---|---|
Base | N/A | N/A |
Temporal | N/A | N/A |
Environmental | N/A | N/A |
References
- http://www.real.com/
- http://www.service.real.com/help/faq/security/bufferoverrun12192002.html
- http://www.nextgenss.com/advisories/realhelix.txt
- http://www.ietf.org/rfc/rfc2326.txt
Credit
Thanks to Mark Litchfield of NGSSoftware Insight Security Research for reporting this vulnerability.
This document was written by Chad R Dougherty.
Other Information
- CVE IDs: Unknown
- Date Public: 20 Dec 2002
- Date First Published: 17 Apr 2003
- Date Last Updated: 17 Apr 2003
- Severity Metric: 6.41
- Document Revision: 14
Feedback
If you have feedback, comments, or additional information about this vulnerability, please send us email.