This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects attempt to a heap based buffer overflow vulnerability in RealPlayer while parsing specially crafted QCP Files.
Real Networks RealPlayer is a media player available for multiple platforms.
The application is prone to a remote code-execution vulnerability. Specifically, the issue affects the 'qcpfformat.dll' file used for parsing QCP media files, which creates a static 256 byte allocation on the heap but fails to check the user-supplied counter from the file.
Successful exploits will allow remote attackers to execute arbitrary code within the context of the affected application. Failed attacks may cause denial-of-service conditions.
Versions prior to RealPlayer for Windows 14.0.6 are vulnerable.
NOTE: This issue was previously discussed in BID 49169 (Real Networks RealPlayer Multiple Remote Vulnerabilities) but has been given its own record to better document it.
- RealPlayer for Windows 14.0.6 and prior.
Vendor has issued an update to resolve this issue. Please visit the vendor's website for further details.