Advisory Details

October 31st, 2007

RealPlayer RA Field Size File Processing Heap Overflow Vulnerability

ZDI-07-063
ZDI-CAN-150

CVE ID CVE-2007-2264
CVSS SCORE
AFFECTED VENDORS RealNetworks
AFFECTED PRODUCTS RealPlayer
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['5214']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute code on vulnerable installations of RealPlayer. User interaction is required in that a user must open a malicious .ra/.ram file or visit a malicious web site.

The specific flaw exists during the parsing of files with improperly defined size field in the RA header. Specifying a large unsigned value data can trigger a heap corruption and further result in arbitrary code execution under the context of the logged in user.

ADDITIONAL DETAILS RealNetworks has issued an update to correct this vulnerability. More details can be found at:
http://service.real.com/realplayer/security/10252007_player/en/
DISCLOSURE TIMELINE
  • 2007-02-16 - Vulnerability reported to vendor
  • 2007-10-31 - Coordinated public release of advisory
  • 2023-09-20 - Advisory Updated
CREDIT Anonymous
BACK TO ADVISORIES