Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title HelixPlayer removal
Informations
Name RHSA-2010:0981 First vendor Publication 2010-12-14
Vendor RedHat Last vendor Modification 2010-12-14
Severity (Vendor) Critical Revision 01

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Problem Description:

Helix Player contains multiple security flaws and should no longer be used. This update removes the HelixPlayer package from Red Hat Enterprise Linux 4.

The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ppc, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, x86_64 Red Hat Enterprise Linux WS version 4 - i386, x86_64

3. Description:

Helix Player is a media player.

Multiple security flaws were discovered in RealPlayer. Helix Player and RealPlayer share a common source code base; therefore, some of the flaws discovered in RealPlayer may also affect Helix Player. Some of these flaws could, when opening, viewing, or playing a malicious media file or stream, lead to arbitrary code execution with the privileges of the user running Helix Player. (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4384, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392)

The Red Hat Security Response Team is unable to properly determine the impact or fix all of these issues in Helix Player, due to the source code for RealPlayer being unavailable.

Due to the security concerns this update removes the HelixPlayer package from Red Hat Enterprise Linux 4. Users wishing to continue to use Helix Player should download it directly from https://player.helixcommunity.org/

4. Solution:

Before applying this update, make sure all previously-released errata relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

662772 - CVE-2010-4384 HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392)

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2010-0981.html

CWE : Common Weakness Enumeration

% Id Name
70 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
10 % CWE-399 Resource Management Errors
10 % CWE-189 Numeric Errors (CWE/SANS Top 25)
10 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 9
Application 10

OpenVAS Exploits

Date Description
2012-07-30 Name : CentOS Update for HelixPlayer-uninstall CESA-2010:0981 centos4 x86_64
File : nvt/gb_CESA-2010_0981_HelixPlayer-uninstall_centos4_x86_64.nasl
2011-08-09 Name : CentOS Update for HelixPlayer-uninstall CESA-2010:0981 centos4 i386
File : nvt/gb_CESA-2010_0981_HelixPlayer-uninstall_centos4_i386.nasl
2010-12-29 Name : RealNetworks RealPlayer Multiple Vulnerabilities (Linux) - Dec 10
File : nvt/gb_realplayer_mult_vuln_lin_dec10.nasl
2010-12-29 Name : RealNetworks RealPlayer Multiple Vulnerabilities (Win) - Dec10
File : nvt/gb_realplayer_mult_vuln_win_01_dec10.nasl
2010-12-29 Name : RealNetworks RealPlayer Multiple Vulnerabilities (Win) - Dec10
File : nvt/gb_realplayer_mult_vuln_win_03_dec10.nasl
2010-12-29 Name : RealNetworks RealPlayer Multiple Vulnerabilities (Win) - Dec10
File : nvt/gb_realplayer_mult_vuln_win_04_dec10.nasl
2010-12-29 Name : RealNetworks RealPlayer Multiple Vulnerabilities (Win) - Dec10
File : nvt/gb_realplayer_mult_vuln_win_dec10.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
69852 RealPlayer Multiple Products RealMedia File Crafted ImageMap Data Overflow

RealPlayer is prone to an overflow condition. The program fails to properly decode data for a particular mime type within a RealMedia file resulting in a heap-based buffer overflow. With specially crafted ImageMap data in a RealMedia file, a context-dependent attacker can potentially execute arbitrary code.
69847 RealPlayer Multiple Products Crafted RealMedia Video File Memory Corruption

A memory corruption flaw exists in RealPlayer. The program fails to sanitize user-supplied input when processing RealMedia video files, resulting in memory corruption. With a specially crafted RealMedia video file, a context-dependent attacker can execute arbitrary code.
69846 RealPlayer Multiple Products SIPR Stream Crafted Frame Dimensions Remote Over...

RealPlayer is prone to an overflow condition. The drv1.dll module fails to properly sanitize user-supplied input resulting in an integer overflow. With a specially crafted .rm file, a context-dependent attacker can potentially execute arbitrary code.
69845 RealPlayer Multiple Products RealMedia File MDPR Header Array Index Error Arb...

A memory corruption flaw exists in RealPlayer. The program fails to sanitize user-supplied input containing a malformed Media Properties Header (MDPR) resulting in memory corruption. With a specially crafted MDPR in a RealMedia file, a context-dependent attacker can execute arbitrary code.
69844 RealPlayer Multiple Products Crafted RA5 File Handling Overflow

RealPlayer is prone to an overflow condition. The program fails to properly sanitize user-supplied input resulting in a heap-based buffer overflow. With a specially crafted RA5 file, a context-dependent attacker can potentially cause an unspecified impact.
69843 RealPlayer Multiple Products Crafted RealMedia File Handling Multiple Remote ...

RealPlayer is prone to an overflow condition. The program fails to properly sanitize user-supplied input resulting in a heap-based buffer overflow. With a specially crafted RealMedia file, a context-dependent attacker can potentially cause an unspecified impact.
69840 RealPlayer Multiple Products Crafted SIPR Handling Overflow

RealPlayer is prone to an overflow condition. The program fails to properly sanitize user-supplied input resulting in a heap-based buffer overflow. With a specially crafted SIPR file, a context-dependent attacker can potentially cause an unspecified impact.
69839 RealPlayer Multiple Products RV20 Decompression Module Video Stream Length Fi...

A memory corruption flaw exists in RealPlayer. The drv2.dll module fails to sanitize user-supplied input when large values are specified for the length field, resulting in memory corruption. With a specially crafted RV20 video stream, a context-dependent attacker can execute arbitrary code.
69836 RealPlayer Multiple Products Audio Stream Multi-rate Data Remote Overflow

RealPlayer is prone to an overflow condition. The program fails to properly sanitize user-supplied input resulting in a heap-based buffer overflow. With a specially crafted multi-rate audio stream, a context-dependent attacker can potentially execute arbitrary code.
69834 RealPlayer Multiple Products ICY SHOUTcast Stream StreamTitle Tag Use-after-f...

A memory corruption flaw exists in RealPlayer.An error in the processing of the "StreamTitle" tag in a SHOUTcast stream using the ICY protocol may be exploited to cause memory corruption. With a specially crafted StreamTitle tag in an ICY SHOUTcast stream a context-dependent attacker can execute arbitrary code.

Nessus® Vulnerability Scanner

Date Description
2013-07-12 Name : The remote Oracle Linux host has a deprecated application.
File : oraclelinux_ELSA-2010-0981.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20101214_HelixPlayer_on_SL4_x.nasl - Type : ACT_GATHER_INFO
2011-01-28 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2010-0981.nasl - Type : ACT_GATHER_INFO
2010-12-15 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2010-0981.nasl - Type : ACT_GATHER_INFO
2010-11-16 Name : An application on the remote Windows host is affected by multiple vulnerabili...
File : realplayer_12_0_1_609.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:54:11
  • Multiple Updates