Executive Summary

Summary
Title Real Media Player filename handler stack buffer overflow vulnerability
Informations
Name VU#246524 First vendor Publication 2013-08-26
Vendor VU-CERT Last vendor Modification 2013-08-26
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#246524

Real Media Player filename handler stack buffer overflow vulnerability

Original Release date: 26 Aug 2013 | Last revised: 26 Aug 2013

Overview

Real Media Player fails to parse filenames correctly, which may allow a remote, unauthenticated attacker to execute arbitrary code in the context of the logged in user.

Description

CWE-121: Stack-based Buffer Overflow - CVE-2013-4973

Real Media Player versions prior to version 16.0.3.51 are vulnerable to a stack buffer overflow when provided with a specially crafted .rmp file. When executed, it may allow a remote unauthenticated attacker to run arbitrary code in the context of the logged in user.

Impact

A remote unauthenticated attacker may obtain sensitive information, cause a denial of service condition, or execute arbitrary code with the privileges of the application..

Solution

Apply an Update
RealNetworks has provided an update to this application, RealPlayer 16.0.3.51. Users are advised to apply the update.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
RealNetworks, Inc.Affected07 Feb 201326 Aug 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base3.7AV:L/AC:H/Au:N/C:P/I:P/A:P
Temporal2.9E:POC/RL:OF/RC:C
Environmental0.9CDP:L/TD:L/CR:ND/IR:ND/AR:ND

References

  • http://service.real.com/realplayer/security/en/
  • http://cwe.mitre.org/data/definitions/121.html

Credit

Thanks to hamburgers maccoy for reporting this vulnerability.

This document was written by Chris King.

Other Information

  • CVE IDs:CVE-2013-4973
  • Date Public:23 Aug 2013
  • Date First Published:26 Aug 2013
  • Date Last Updated:26 Aug 2013
  • Document Revision:23

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/246524

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 139
Application 10

Information Assurance Vulnerability Management (IAVM)

Date Description
2013-08-29 IAVM : 2013-A-0166 - Multiple Security Vulnerabilities in RealNetworks RealPlayer
Severity : Category II - VMSKEY : V0040163

Nessus® Vulnerability Scanner

Date Description
2013-08-28 Name : A multimedia application on the remote Windows host is affected by multiple v...
File : realplayer_16_0_3_51.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2014-02-17 12:07:39
  • Multiple Updates
2013-08-29 13:27:21
  • Multiple Updates
2013-08-27 13:23:37
  • Multiple Updates
2013-08-26 17:19:13
  • First insertion