Korean
<< Back
VID 28032
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Windows RealPlayer has a PNG deflate heap corruption vulnerability.
The vulnerability is related to the way RealPlayer handles PNG (Portable Network Graphics) image files. Specifically, the vulnerability occurs when RealPlayer attempts to decompress PNG image files. By creating a specifically corrupted PNG file, it is possible to cause heap corruption to occur, allowing an attacker to execute arbitrary code on a user's machine.
An attacker can exploit this vulnerability by tricking a user into viewing a maliciously constructed PNG image file. When the image file is rendered by the RealPlayer, it will trigger the heap corruption condition and overwrite critical areas in memory with attacker-supplied values.

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://marc.theaimsgroup.com/?l=bugtraq&m=104887465427579&w=2
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0156.html
http://www.coresecurity.com/common/showdoc.php?idx=311&idxseccion=10
http://www.kb.cert.org/vuls/id/705761

* Platforms Affected:
Real Networks RealOne Player 6.0.11.853 or prior
Real Networks RealOne Player 6.0.10.xxx
Real Networks RealOne Player 6.0.9.584 or prior
Microsoft Windows Any version
Recommendation Install the updates, available from the RealNetworks Security Update, 2003.3:
http://service.real.com/help/faq/security/securityupdate_march2003.html
Related URL CVE-2003-0141 (CVE)
Related URL 7177 (SecurityFocus)
Related URL (ISS)