1. Symantec-Broadcom-Horizontal/
  2. Security Response/
  3. Attack Signatures/
  4. Attack: RealPlayer QCP File CVE-2011-2950

Attack: RealPlayer QCP File CVE-2011-2950

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempt to a heap based buffer overflow vulnerability in RealPlayer while parsing specially crafted QCP Files.

Additional Information

Real Networks RealPlayer is a media player available for multiple platforms.

The application is prone to a remote code-execution vulnerability. Specifically, the issue affects the 'qcpfformat.dll' file used for parsing QCP media files, which creates a static 256 byte allocation on the heap but fails to check the user-supplied counter from the file.

Successful exploits will allow remote attackers to execute arbitrary code within the context of the affected application. Failed attacks may cause denial-of-service conditions.

Versions prior to RealPlayer for Windows 14.0.6 are vulnerable.

NOTE: This issue was previously discussed in BID 49169 (Real Networks RealPlayer Multiple Remote Vulnerabilities) but has been given its own record to better document it.

Affected

  • RealPlayer for Windows 14.0.6 and prior.

Response

Vendor has issued an update to resolve this issue. Please visit the vendor's website for further details.
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube