Korean
<< Back
VID 23055
Severity 40
Port 554
Protocol TCP
Class RTSP
Detailed Description The Helix Universal Server has a RTSP protocol parser buffer overflow vulnerability.
RealNetworks' Helix Universal Server is a streaming audio server that supports all major media file formats. Helix Universal Server versions 9 and earlier could allow a remote attacker to execute arbitrary code on the server with root privileges, caused by a vulnerability in the "View Source" plug-in. This vulnerability arises when certain types of character strings appear in large numbers within URLs destined for the Server's protocol parsers.

* Note: This check solely relied on the version number of the remote Helix Server to assess this vulnerability, so this might be a false positive.

* References:
http://www.kb.cert.org/vuls/id/934932
http://www.ciac.org/ciac/bulletins/n-152.shtml
http://service.real.com/help/faq/security/bufferoverrun030303.html
http://www.service.real.com/help/faq/security/rootexploit091103.html
http://www.service.real.com/help/faq/security/rootexploit082203.html

* Platforms Affected:
RealNetworks, Inc. Helix Universal Server 9.0 and earlier
Microsoft Windows Any version
Various Unix Any version
Recommendation Upgrade to the latest version of Helix Universal Server (9.0.2.802 or later), available from the RealNetworks Customer Support Web site at http://www.service.real.com/help/faq/security/rootexploit091103.html

As a workaround, remove the "View Source" plug-in from the /Plugins directory. The plug-in will have the following filenames, depending on architecture:
vsrcplin.so (UNIX)
vsrcplin.dll (Windows)

The server should then be restarted. With the plug-in removed, the Content Browsing feature will be disabled.
Related URL CVE-2003-0725 (CVE)
Related URL 8476 (SecurityFocus)
Related URL 13004 (ISS)