1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. Web Attack: RealPlayer .rmp Buffer Overflow

Web Attack: RealPlayer .rmp Buffer Overflow

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempts to exploit a buffer overflow vulnerability in RealPlayer by crafting a malicious .rmp file.

Additional Information

RealPlayer is an application that allows users to play back various media formats.

RealPlayer is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Specifically, this issue occurs while handling specially crafted '.rmp' files.

Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

RealPlayer 11.0 is vulnerable; other versions may also be affected.

Affected

  • RealPlayer 11.0 is vulnerable; other versions may also be affected.

Response

Currently, we are not aware of any vendor-supplied patches.

Additional References

  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube