Executive Summary
Summary | |
---|---|
Title | RealPlayer security update |
Informations | |||
---|---|---|---|
Name | RHSA-2005:523 | First vendor Publication | 2005-06-23 |
Vendor | RedHat | Last vendor Modification | 2005-06-23 |
Severity (Vendor) | Critical | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 5.1 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An updated RealPlayer package that fixes a buffer overflow issue is now available. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 Extras - i386, x86_64 Red Hat Desktop version 3 Extras - i386, x86_64 Red Hat Enterprise Linux ES version 3 Extras - i386, x86_64 Red Hat Enterprise Linux WS version 3 Extras - i386, x86_64 Red Hat Enterprise Linux AS version 4 Extras - i386, x86_64 Red Hat Desktop version 4 Extras - i386, x86_64 Red Hat Enterprise Linux ES version 4 Extras - i386, x86_64 Red Hat Enterprise Linux WS version 4 Extras - i386, x86_64 3. Problem description: RealPlayer is a media player that provides solid media playback locally and via streaming. It plays RealAudio, RealVideo, MP3, 3GPP Video, Flash, SMIL 2.0, JPEG, GIF, PNG, RealPix, RealText, and more. A buffer overflow bug was found in the way RealPlayer processes SMIL files. An attacker could create a specially crafted SMIL file, which when combined with a malicious Web server, could execute arbitrary code when opened by a user. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-1766 to this issue. All users of RealPlayer are advised to upgrade to this updated package, which contains RealPlayer version 10.0.5 and is not vulnerable to this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 159864 - CAN-2005-1766 RealPlayer heap overflow 159868 - CAN-2005-1766 RealPlayer heap overflow |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2005-523.html |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:9509 | |||
Oval ID: | oval:org.mitre.oval:def:9509 | ||
Title: | Heap-based buffer overflow in rtffplin.cpp in RealPlayer 10.5 6.0.12.1056 on Windows, and 10, 10.0.1.436, and other versions before 10.0.5 on Linux, allows remote attackers to execute arbitrary code via a RealMedia file with a long RealText string, such as an SMIL file. | ||
Description: | Heap-based buffer overflow in rtffplin.cpp in RealPlayer 10.5 6.0.12.1056 on Windows, and 10, 10.0.1.436, and other versions before 10.0.5 on Linux, allows remote attackers to execute arbitrary code via a RealMedia file with a long RealText string, such as an SMIL file. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2005-1766 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200507-04 (realplayer) File : nvt/glsa_200507_04.nasl |
2008-09-04 | Name : FreeBSD Ports: linux-realplayer File : nvt/freebsd_linux-realplayer1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 826-1 (helix-player) File : nvt/deb_826_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
17575 | RealPlayer rtffplin.cpp RealText File Parser Overflow |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | RealNetworks RealPlayer realtext file bad version buffer overflow attempt RuleID : 3823 - Revision : 21 - Type : FILE-MULTIMEDIA |
2014-01-10 | RealNetworks RealPlayer realtext long URI request attempt RuleID : 3822 - Revision : 15 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-07-05 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2005-517.nasl - Type : ACT_GATHER_INFO |
2005-10-05 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-826.nasl - Type : ACT_GATHER_INFO |
2005-07-20 | Name : The remote host is missing a vendor-supplied security patch File : suse_SA_2005_037.nasl - Type : ACT_GATHER_INFO |
2005-07-13 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_95ee96f2e48811d9bf22080020c11455.nasl - Type : ACT_GATHER_INFO |
2005-07-06 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200507-04.nasl - Type : ACT_GATHER_INFO |
2005-06-24 | Name : The remote Windows application is affected by multiple vulnerabilities. File : realplayer_realtext_parsing_overflow.nasl - Type : ACT_GATHER_INFO |
2005-06-24 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2005-517.nasl - Type : ACT_GATHER_INFO |
2005-06-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2005-523.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:49:28 |
|