| VID |
28094 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The RealOne/RealPlayer, according to its version number, has a buffer overflow vulnerability via the skin file. RealOne / RealPlayer is one of the most widely used products for internet media delivery for Microsoft Windows platforms and most Linux and Unix-based operating systems. RealPlayer 10.x versions 6.0.12.1053 and earlier, and RealOne Player versions 1 and 2 for Microsoft Windows are vulnerable to a stack based buffer overflow vulnerability, caused by improper boundary checks performed on filenames contained in skin file archives. By creating a malicious skin file, a remote attacker could execute arbitrary code on the victim's system in the context of the victim that visits a malicious website, or that applies a malicious skin file manually.
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://archives.neohapsis.com/archives/bugtraq/2004-10/0302.html http://www.ciac.org/ciac/bulletins/p-023.shtml
* Platforms Affected: RealNetworks, Inc., RealOne Player 1.0 RealNetworks, Inc., RealOne Player 2.0 RealNetworks, Inc., RealPlayer 10.x (6.0.12.1053) Microsoft Windows Any version |
| Recommendation |
Apply the appropriate update for your system, as listed in RealNetworks, Inc. Releases Update October 26, 2004 at http://www.service.real.com/help/faq/security/041026_player/EN/ |
| Related URL |
CVE-2004-1094 (CVE) |
| Related URL |
11555 (SecurityFocus) |
| Related URL |
17879 (ISS) |
|