FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

linux-realplayer -- multiple vulnerabilities

Affected packages
10.0.5 <= linux-realplayer < 10.0.9.809.20070726

Details

VuXML ID f762ccbb-baed-11dc-a302-000102cc8983
Discovery 2007-10-25
Entry 2008-01-04

Secunia reports:

Multiple vulnerabilities have been reported in RealPlayer/RealOne/HelixPlayer, which can be exploited by malicious people to compromise a user's system.

An input validation error when processing .RA/.RAM files can be exploited to cause a heap corruption via a specially crafted .RA/.RAM file with an overly large size field in the header.

An error in the processing of .PLS files can be exploited to cause a memory corruption and execute arbitrary code via a specially crafted .PLS file.

An input validation error when parsing .SWF files can be exploited to cause a buffer overflow via a specially crafted .SWF file with malformed record headers.

A boundary error when processing rm files can be exploited to cause a buffer overflow.

References

CERT/CC Vulnerability Note 759385
CVE Name CVE-2007-2263
CVE Name CVE-2007-2264
CVE Name CVE-2007-3410
CVE Name CVE-2007-5081
URL http://secunia.com/advisories/25819/
URL http://secunia.com/advisories/27361
URL http://service.real.com/realplayer/security/10252007_player/en/
URL http://www.zerodayinitiative.com/advisories/ZDI-07-061.html
URL http://www.zerodayinitiative.com/advisories/ZDI-07-062.html
URL http://www.zerodayinitiative.com/advisories/ZDI-07-063.html